Sample records for keys including public

  1. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15T23:59:59.000Z

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  2. Bioenergy Key Publications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyand SustainedBio-OilBioenergy 2015 AgendaBioenergyKEY

  3. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  4. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01T23:59:59.000Z

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  5. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  6. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  7. Security Notions for Quantum Public-Key Cryptography

    E-Print Network [OSTI]

    Takeshi Koshiba

    2007-02-19T23:59:59.000Z

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

  8. Community Assessment Tool for Public Health Emergencies Including Pandemic Influenza

    SciTech Connect (OSTI)

    ORAU's Oak Ridge Institute for Science Education (HCTT-CHE)

    2011-04-14T23:59:59.000Z

    The Community Assessment Tool (CAT) for Public Health Emergencies Including Pandemic Influenza (hereafter referred to as the CAT) was developed as a result of feedback received from several communities. These communities participated in workshops focused on influenza pandemic planning and response. The 2008 through 2011 workshops were sponsored by the Centers for Disease Control and Prevention (CDC). Feedback during those workshops indicated the need for a tool that a community can use to assess its readiness for a disaster - readiness from a total healthcare perspective, not just hospitals, but the whole healthcare system. The CAT intends to do just that - help strengthen existing preparedness plans by allowing the healthcare system and other agencies to work together during an influenza pandemic. It helps reveal each core agency partners (sectors) capabilities and resources, and highlights cases of the same vendors being used for resource supplies (e.g., personal protective equipment [PPE] and oxygen) by the partners (e.g., public health departments, clinics, or hospitals). The CAT also addresses gaps in the community's capabilities or potential shortages in resources. This tool has been reviewed by a variety of key subject matter experts from federal, state, and local agencies and organizations. It also has been piloted with various communities that consist of different population sizes, to include large urban to small rural communities.

  9. An efficient public key infrastructure revocation mechanism

    E-Print Network [OSTI]

    Collins, Tamara Lyn

    2000-01-01T23:59:59.000Z

    IMPLEMENTATION 35 PKI Structure Key/Certificate Storage in the Repository. PKI User Interface Communication Between Entities. User Interface to RA Communication . . RA to CA Communication CA to Repository Communication. User Interface to Repository... Communication. . . . 42 11 CA to Certificate Repository Communication. . . 43 12 User Interface to Certificate Repository Communication. . . . . . . 44 13 Certificate Creation Process. . . 46 14 Certificate Revocation Process. . 48 15 Certificate Retrieval...

  10. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platform isEnergyMeeting | Department ofTransportation Fuels | DepartmentKey

  11. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20T23:59:59.000Z

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  12. Public-Key Locally-Decodable Codes Brett Hemenway

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

  13. Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes

    E-Print Network [OSTI]

    Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

  14. Public key Steganography Using Discrete Cross-Coupled Chaotic Maps

    E-Print Network [OSTI]

    Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

    2012-11-01T23:59:59.000Z

    By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

  15. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  16. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  17. Community Assessment Tool for Public Health Emergencies Including Pandemic Influenza

    SciTech Connect (OSTI)

    HCTT-CHE

    2011-04-14T23:59:59.000Z

    The Community Assessment Tool (CAT) for Public Health Emergencies Including Pandemic Influenza (hereafter referred to as the CAT) was developed as a result of feedback received from several communities. These communities participated in workshops focused on influenza pandemic planning and response. The 2008 through 2011 workshops were sponsored by the Centers for Disease Control and Prevention (CDC). Feedback during those workshops indicated the need for a tool that a community can use to assess its readiness for a disaster—readiness from a total healthcare perspective, not just hospitals, but the whole healthcare system. The CAT intends to do just that—help strengthen existing preparedness plans by allowing the healthcare system and other agencies to work together during an influenza pandemic. It helps reveal each core agency partners' (sectors) capabilities and resources, and highlights cases of the same vendors being used for resource supplies (e.g., personal protective equipment [PPE] and oxygen) by the partners (e.g., public health departments, clinics, or hospitals). The CAT also addresses gaps in the community's capabilities or potential shortages in resources. While the purpose of the CAT is to further prepare the community for an influenza pandemic, its framework is an extension of the traditional all-hazards approach to planning and preparedness. As such, the information gathered by the tool is useful in preparation for most widespread public health emergencies. This tool is primarily intended for use by those involved in healthcare emergency preparedness (e.g., community planners, community disaster preparedness coordinators, 9-1-1 directors, hospital emergency preparedness coordinators). It is divided into sections based on the core agency partners, which may be involved in the community's influenza pandemic influenza response.

  18. The GH Public-key Cryptosystem Guang Gong, Lein Harn , and Huapeng Wu

    E-Print Network [OSTI]

    Gong, Guang

    The GH Public-key Cryptosystem Guang Gong, Lein Harn #3; , and Huapeng Wu #3;#3; Department-order characteristic sequences which was proposed by Gong and Harn in 1999. Key words. Public-key cryptosystem, digital signature, third-order linear feedback shift register sequences over #12;nite #12;elds. 1 Introduction Gong

  19. Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion Ashish Khisti Member, IEEE Abstract Fundamental limits of secret-key generation over a two-way, reciprocal and block establish upper and lower bounds on the secret-key generation capacity with public discussion. The upper

  20. Non-Coherent Capacity of Secret-Key Agreement with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Non-Coherent Capacity of Secret-Key Agreement with Public Discussion Anurag Agrawal, Zouheir-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number

  1. Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky #

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky a public­key encryption scheme for Alice that allows PIR searching over encrypted documents. Our solution­trivially small communication complexity. The main technique of our solution also allows for Single­Database PIR

  2. Non-Coherent Capacity of Secret-Key Agreement with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Non-Coherent Capacity of Secret-Key Agreement with Public Discussion Anurag Agrawal, Zouheir--We study the non-coherent capacity of secret-key agreement with public discussion over i.i.d. Rayleigh state information (CSI). We present two results. At high Signal-to-Noise Ratio (SNR), the secret

  3. Cryptanalysis of two knapsack public-key cryptosystems

    E-Print Network [OSTI]

    Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

  4. Public Sector Digest | July 2010 | www.publicsectordigest.com Key Aspects of the Deliberative Democracy Movement

    E-Print Network [OSTI]

    Public Sector Digest | July 2010 | www.publicsectordigest.com Key Aspects of the Deliberative Digest | July 2010 | www.publicsectordigest.com underlying tensions and tough choices inherent to most

  5. A Method for Obtaining Digital Signatures and PublicKey Cryptosystems

    E-Print Network [OSTI]

    Goldwasser, Shafi

    re­ vealing an encryption key does not thereby reveal the corresponding decryption key. This has two, or the entire work requires specific permission as does republication, or systematic or multiple reproduction . Formally, D(E(M) = M: (1) (b) Both E and D are easy to compute. (c) By publicly revealing E the user does

  6. Deterministic quantum-public-key encryption: forward search attack and randomization

    E-Print Network [OSTI]

    Georgios M. Nikolopoulos; Lawrence M. Ioannou

    2009-03-27T23:59:59.000Z

    In the classical setting, public-key encryption requires randomness in order to be secure against a forward search attack, whereby an adversary compares the encryption of a guess of the secret message with that of the actual secret message. We show that this is also true in the information-theoretic setting -- where the public keys are quantum systems -- by defining and giving an example of a forward search attack for any deterministic quantum-public-key bit-encryption scheme. However, unlike in the classical setting, we show that any such deterministic scheme can be used as a black box to build a randomized bit-encryption scheme that is no longer susceptible to this attack.

  7. PublicKey LocallyDecodable Codes Brett Hemenway # Rafail Ostrovsky +

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Semantically­Secure Public Key En­ cryption (SS­PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

  8. Confidence Valuation in a Public-Key Infrastructure based on Uncertain Evidence

    E-Print Network [OSTI]

    Maurer, Ueli

    Confidence Valuation in a Public-Key Infrastructure based on Uncertain Evidence Reto Kohlas Ueli an uncertain piece of evidence and have proposed ad hoc methods, sometimes referred to as trust management and the valuation of confidence values in the general context of reasoning based on uncertain evidence. Second, we

  9. Confidence Valuation in a PublicKey Infrastructure based on Uncertain Evidence

    E-Print Network [OSTI]

    Maurer, Ueli

    Confidence Valuation in a Public­Key Infrastructure based on Uncertain Evidence Reto Kohlas Ueli an uncertain piece of evidence and have proposed ad hoc methods, sometimes referred to as trust management and the valuation of confidence values in the general context of reasoning based on uncertain evidence. Second, we

  10. Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky # William E. Skeith III

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Public Key Encryption that Allows PIR Queries Dan Boneh # Eyal Kushilevitz + Rafail Ostrovsky a public­key encryption scheme for Alice that allows PIR searching over encrypted documents. Our solution­trivially small communication complexity. The main technique of our solution also allows for Single­Database PIR

  11. Public-Key Cryptography Standards: PKCS Yongge Wang, Ph.D., University of North Carolina at Charlotte

    E-Print Network [OSTI]

    Wang, Yongge

    ;· ISO/IEC. The International Organization for Standardization (ISO) and the International Electrotech. The major standards organizations that have been involved in public key cryptographic techniques are: 1 #12Public-Key Cryptography Standards: PKCS Yongge Wang, Ph.D., University of North Carolina

  12. #include #include

    E-Print Network [OSTI]

    Campbell, Andrew T.

    process #12;#include #include pid_t pid = fork(); if (pid () failed */ } else if (pid == 0) { /* parent process */ } else { /* child process */ } #12;thread #12

  13. #include #include

    E-Print Network [OSTI]

    Poinsot, Laurent

    #include #include //Rappels : "getpid()" permet d'obtenir son propre pid // "getppid()" renvoie le pid du père d'un processus int main (void) { pid_t pid_fils; pid_fils = fork(); if(pid_fils==-1) { printf("Erreur de création du processus fils\

  14. Certificating Vehicle Public Key with Vehicle Attributes A (periodical) Licensing Routine, Against Man-in-the-Middle

    E-Print Network [OSTI]

    Certificating Vehicle Public Key with Vehicle Attributes A (periodical) Licensing Routine, Against actions among vehicles in traffic by the use of wireless transceivers. Unfortunately, the wireless communication among vehicles is vulnerable to security threats that may lead to very serious safety hazards

  15. Multi-Signatures in the Plain Public-Key Model and a General Forking Lemma

    E-Print Network [OSTI]

    Bellare, Mihir

    many potential uses. However, existing schemes impose key setup or PKI requirements that make them. Such a system could be useful for contract signing, co-signing, or distribution of a certificate authority power than executing one 32-bit instruction [4]. Reducing the number of bits to communicate saves power

  16. Key to Juniperus of Central Asia (from Turkmenistan/Iran through the former Soviet rev. 2/2011 Union, Pakistan and the Western Himalayas, including Nepal)

    E-Print Network [OSTI]

    Adams, Robert P.

    /2011 Union, Pakistan and the Western Himalayas, including Nepal) 1a. All leaves acicular (subulate, jointed

  17. These professional development opportunities have been made possible through grants from the Office of Public Instruction (OPI), including the 2008 OPI

    E-Print Network [OSTI]

    Lawrence, Rick L.

    of Public Instruction (OPI), including the 2008 OPI Indian Education for All Montana University System's Professional Development Institute In collaboration with OPI and OCHE, participants from the seven Tribal education. Mike Jetty, Indian Education Specialist at OPI; Ellen Swaney, Director of Minority/Indian Student

  18. Performance contracting for small fry -- Including individually owned multi-family buildings in a public/private sector partnership

    SciTech Connect (OSTI)

    Burger, M.; Jensen, V.

    1998-07-01T23:59:59.000Z

    Performance contracting has worked well in large multi-family buildings markets, such as public housing authorities. As equally deserving a market are assisted housing developments, which tend to be smaller scale in terms of size and ownership. This scale discourages energy service companies (ESO's) from approaching these developments because marketing and other transaction costs may be considered prohibitive. One answer to this barrier is a partnership that may act as an umbrella and aggregator for this market. The Illinois Housing Development Authority, assisted by the US Department of Energy's Chicago Regional Support office, is piloting such a partnership for developments that has its mortgages. Working with ESCO Landis and Staefa, Inc., this ongoing initiative is expanding performance contracting into the assisted housing market.

  19. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-06-11T23:59:59.000Z

    Information in this chapter of the directive has been consolidated into the Identity, Credential, and Access Management (ICAM) Program as defined in DOE O 206.2.

  20. Global MSW Generation in 2007 estimated at two billion tons Global Waste Management Market Assessment 2007, Key Note Publications Ltd ,

    E-Print Network [OSTI]

    Columbia University

    analyses the global waste market, with particular reference to municipal solid waste (MSW). Key NoteGlobal MSW Generation in 2007 estimated at two billion tons Global Waste Management Market between growth in wealth and increase in waste -- the more affluent a society becomes, the more waste

  1. Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Earthquake Engineering and Structural Dynamics Engineering Institute Publications-Earthquake Engineering and Structural Dynamics Contact Institute Director Charles Farrar (505)...

  2. Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Publications-Sensors and Sensing Technologies Contact Institute Director Charles Farrar (505) 663-5330 Email UCSD EI Director Michael Todd (858) 534-5951 Professional Staff...

  3. Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Engineering Institute Publications-Damage Prognosis Contact Institute Director Charles Farrar (505) 663-5330 Email UCSD EI Director Michael Todd (858) 534-5951 Professional Staff...

  4. Key Workplace Documents Federal Publications

    E-Print Network [OSTI]

    recognized labor standards and the cross-border movement of workers have been addressed by international organizations, as well as in U.S. trade legislation and recent trade agreements. #12;1 International Cooperation and the transboundary movement of workers--have been addressed by the International Labour Organization (ILO), the World

  5. Key Publications | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions for DOEtheInspection15Department ofofKahuku253.16582104)About2:

  6. Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclear Press Releases ArchiveServicesPublication PolicyPublications

  7. Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclear Press Releases ArchiveServicesPublication PolicyPublications

  8. ZooKeys, unlocking Earth’s incredible biodiversity and building a sustainable bridge into the public domain: From “print-based” to “web-based” taxonomy, systematics, and natural history. ZooKeys Editorial Opening Paper

    E-Print Network [OSTI]

    Penev, Lyubomir; Erwin, Terry; Thompson, F. Christian; Sues, Hans-Dieter; Engel, Michael S.; Agosti, Donat; Pyle, Richard; Ivie, Michael; Assmann, Thorsten; Henry, Thomas; Miller, Jeremy; Ananjeva, Natalia; Casale, Achille; Lourenco, Wilson; Golovatch, Sergei; Fagerholm, Hans-Peter; Taiti, Stefano; Alonso-Zarazaga, Miguel; Nieukerken, Erik van

    2008-07-04T23:59:59.000Z

    and print journal in zoological taxonomy and systematics, which aims to quickly respond and adapt to the newest developments in taxonomic publishing. Open Access is accepted as mandatory for ZooKeys. Th e rationale for and concept of ZooKeys is discussed...

  9. Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeedingTechnical News,Program90803|Publications Resources Policies, Manuals

  10. Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeedingTechnical News,Program90803|Publications Resources Policies,

  11. Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeedingTechnical News,Program90803|Publications Resources

  12. Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeedingTechnical News,Program90803|Publications ResourcesSensing

  13. Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeedingTechnical News,Program90803|Publications ResourcesSensingLee »

  14. Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeedingTechnical News,Program90803|Publications ResourcesSensingLee

  15. Experimental study of high speed polarization-coding quantum key distribution with sifted-key

    E-Print Network [OSTI]

    and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

  16. ORISE: Public Health Preparedness

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    by convening community-based workshops and key stakeholder meetings aimed at managing a health care surge during a public health emergency. By identifying and involving key...

  17. Key distributionKey distribution Key distribution, symmetric encryption

    E-Print Network [OSTI]

    Fisher, Michael

    COMP 522 Key distributionKey distribution COMP 522 Key distribution, symmetric encryption From in a secure way and must keep the key secure" · Important issue: how to distribute secret keys? COMP 522 Key distribution, manual delivery For two parties A and B: · A key could be created by A and delivered physically

  18. UKERC ENERGY RESEARCH ATLAS: CARBON CAPTURE AND STORAGE (version 10 February 2008) Section 1: An overview which includes a broad characterisation of research activity in the sector and the key research challenges

    E-Print Network [OSTI]

    Haszeldine, Stuart

    UKERC ENERGY RESEARCH ATLAS: CARBON CAPTURE AND STORAGE (version 10 February 2008) Section 1 Research and Technology Development (RTD) Programmes. Section 8: UK participation in energy-related EU international initiatives, including those supported by the International Energy Agency. Version 1.2 published

  19. AMERICAN ANTHROPOLOGIST Public Anthropology

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    AMERICAN ANTHROPOLOGIST Public Anthropology 2012 Public Anthropology Year in Review: Actually, Rick a torrent of criticism from anthropologists, including an online response by #12;Year in Review: Public

  20. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01T23:59:59.000Z

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  1. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21T23:59:59.000Z

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  2. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  3. US public perspectives on security :

    SciTech Connect (OSTI)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.; Silva, Carol L.

    2012-02-01T23:59:59.000Z

    We report findings from a national Internet survey and a subset of questions administered by telephone in mid-2011 on public assessments of contemporary and emerging interstate nuclear threats, support for strategic arms control, and preferences for responding to limited nuclear attacks on the United States. Additionally, we analyze public views of the threat of terrorism, including cyber attacks, assessments of progress in the struggle against terrorism, and preferences for responding to an act of radiological terrorism against the United States. Also, we report findings from an Internet survey and a subset of questions administered by telephone among the American public in mid-2011 on US energy and environmental security. Key areas of investigation include public views on energy requirements, preferences for energy sources, energy conservation versus development, energy independence, implications of events at Fukushima, Japan, for US public support of nuclear generation, preferences for managing used nuclear fuel, and trust in nuclear risk assessments from government and other public sources. Where possible, findings from each survey are compared with previous surveys in this series for analyses of trends.

  4. Quantum Key Distribution with Screening and Analyzing

    E-Print Network [OSTI]

    Won-Ho Kye

    2006-10-04T23:59:59.000Z

    We propose a quantum key distribution scheme by using screening angles and analyzing detectors which enable to notice the presence of Eve who eavesdrops the quantum channel, as the revised protocol of the recent quantum key distribution [Phys. Rev. Lett. 95, 040501 (2005)]. We discuss the security of the proposed quantum key distribution against various attacks including impersonation attack and Trojan Horse attack.

  5. Key-shift transmission

    SciTech Connect (OSTI)

    Nemoto, S.

    1989-03-07T23:59:59.000Z

    A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

  6. Publications, 1977-1979

    SciTech Connect (OSTI)

    Hilborn, H.S. (comp.)

    1980-03-01T23:59:59.000Z

    This is a compilation of documents that communicate the results of scientific and technical work done at Savannah River. The compilation includes those documents that have been published (research and development reports, journal articles, book chapters, etc.), and documents that have been announced in Energy Research Abstracts. Where applicable, the meeting at which the paper was presented is given. This report updates the information included in DP-929, Rev. 2, Publications, 1951 through 1971 and DP-929-1, Publications, 1972 through 1976, and replaces DP-929-1, Supplements 1 and 2. The bibliographic listing is arranged alphabetically by the first-mentioned author of each document. The listing includes an identifying code number. This identifying code is used to cross reference the author and subject listings with the bibliographic information. The subject listing is arranged alphabetically by key word out of context (KWOC) indexing of the titles. The listing includes the identifying code number and the complete title. The author listing includes in alphabetical order all authors, coauthors, editors, and compilers with identifying code numbers, and the titles of all documents on which their names appear. (RWR)

  7. Other Geothermal Energy Publications

    Broader source: Energy.gov [DOE]

    Here you'll find links to other organization's publicationsincluding technical reports, newsletters, brochures, and more — about geothermal energy.

  8. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  9. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys Beno^it Libert1 in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re' public keys are public identifiers (e.g. email addresses) and the matching private keys are derived

  10. NREL: Publications - Obtain Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sheets, technical reports, and more-from the following sources: NREL Publications Database Search for publications and bibliographic citations using our database. Many...

  11. Quantum dense key distribution

    SciTech Connect (OSTI)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

    2004-03-01T23:59:59.000Z

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  12. Evolution as Computation Evolutionary Theory (accepted for publication)

    E-Print Network [OSTI]

    Mayfield, John

    1/21/05 1 Evolution as Computation Evolutionary Theory (accepted for publication) By: John E: jemayf@iastate.edu Key words: Evolution, Computation, Complexity, Depth Running head: Evolution of evolution must include life and also non-living processes that change over time in a manner similar

  13. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  14. Perspectives Nanotechnology and the public: Effectively communicating nanoscale science

    E-Print Network [OSTI]

    Crone, Wendy C.

    Perspectives Nanotechnology and the public: Effectively communicating nanoscale science August 2006 Key words: nanotechnology, communication, public knowledge, public understanding the public on concepts and applications associated with nanotechnology. The goal of our work

  15. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance ° Trusted security policy routines ° Secure and authentic key storage

  16. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  17. Key Request (Last) (First)

    E-Print Network [OSTI]

    Carrington, Emily

    will be accessing. For Johnson Hall exterior door access bring a copy of this form to the Earth & Space SciencesKey Request Form Name: (Last) (First) Contact Info Keys Cardswipe UW Email: Hitchcock Exterior Door Room:_________ Room:_________ Johnson Room:_________ Room:_________ Kincaid Exterior Door Room

  18. www.defra.gov.uk Environmental Key

    E-Print Network [OSTI]

    ;Environmental Key Performance Indicators Reporting Guidelines for UK Business #12;Department for Environment with the Crown. This publication (excluding the logo) may be reproduced free of charge in any format or medium they operate in, and their impact on the environment, are most likely to prosper in the long-term. At the same

  19. Internship Contract (Includes Practicum)

    E-Print Network [OSTI]

    Thaxton, Christopher S.

    Internship Contract (Includes Practicum) Student's name-mail: _________________________________________ Internship Agency Contact Agency Name: ____________________________________ Address-mail: __________________________________________ Location of Internship, if different from Agency: ________________________________________________ Copies

  20. Pump apparatus including deconsolidator

    DOE Patents [OSTI]

    Sonwane, Chandrashekhar; Saunders, Timothy; Fitzsimmons, Mark Andrew

    2014-10-07T23:59:59.000Z

    A pump apparatus includes a particulate pump that defines a passage that extends from an inlet to an outlet. A duct is in flow communication with the outlet. The duct includes a deconsolidator configured to fragment particle agglomerates received from the passage.

  1. Living Expenses (includes approximately

    E-Print Network [OSTI]

    Maroncelli, Mark

    & engineering programs All other programs Graduate: MBA/INFSY at Erie & Harrisburg (12 credits) Business Guarantee 3 (Does not include Dependents Costs4 ) Altoona, Berks, Erie, and Harrisburg 12-Month Estimated

  2. Graduate School of Public Health (Graduate School of Public Health) (Dept. of Public Health)`

    E-Print Network [OSTI]

    Kim, Guebuem

    including environmental health covering concept of contents and meanings. (Health Care Management-3-0 History of Health & Medical Care , , . , , , . This course reviews Graduate School of Public Health #12;#12;(Graduate School of Public Health) (Dept. of Public

  3. Public involvement in radioactive waste management decisions

    SciTech Connect (OSTI)

    NONE

    1994-04-01T23:59:59.000Z

    Current repository siting efforts focus on Yucca Mountain, Nevada, where DOE`s Office of Civilian Radioactive Waste Management (OCRWM) is conducting exploratory studies to determine if the site is suitable. The state of Nevada has resisted these efforts: it has denied permits, brought suit against DOE, and publicly denounced the federal government`s decision to study Yucca Mountain. The state`s opposition reflects public opinion in Nevada, and has considerably slowed DOE`s progress in studying the site. The Yucca Mountain controversy demonstrates the importance of understanding public attitudes and their potential influence as DOE develops a program to manage radioactive waste. The strength and nature of Nevada`s opposition -- its ability to thwart if not outright derail DOE`s activities -- indicate a need to develop alternative methods for making decisions that affect the public. This report analyzes public participation as a key component of this openness, one that provides a means of garnering acceptance of, or reducing public opposition to, DOE`s radioactive waste management activities, including facility siting and transportation. The first section, Public Perceptions: Attitudes, Trust, and Theory, reviews the risk-perception literature to identify how the public perceives the risks associated with radioactivity. DOE and the Public discusses DOE`s low level of credibility among the general public as the product, in part, of the department`s past actions. This section looks at the three components of the radioactive waste management program -- disposal, storage, and transportation -- and the different ways DOE has approached the problem of public confidence in each case. Midwestern Radioactive Waste Management Histories focuses on selected Midwestern facility-siting and transportation activities involving radioactive materials.

  4. 1 Public Policy and Public Administration PUBLIC POLICY AND PUBLIC

    E-Print Network [OSTI]

    Vertes, Akos

    1 Public Policy and Public Administration PUBLIC POLICY AND PUBLIC ADMINISTRATION Through its Trachtenberg School of Public Policy and Public Administration, Columbian College of Arts and Sciences offers the Master of Public Policy, Master of Public Administration, and the Doctor of Philosophy in the field

  5. JLF Publication Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    performed at the Facility. Vehicles for the publication may include: Journal articles Conference proceedings articles Books or book chapters Technical reports Dissertations...

  6. EIA publications directory, 1992

    SciTech Connect (OSTI)

    Not Available

    1993-06-24T23:59:59.000Z

    This directory contains abstracts and ordering information for EIA publications. The abstracts are arranged by broad subject category such as coal, petroleum, natural gas, and electric power. A comprehensive subject index, a title index, and a report number index are included. Each entry gives the title, report number, publication frequency, date, number of pages, and ordering information. Publication began with the 1979 edition.

  7. Public Meetings

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Public Meetings Individual Permit: Public Meetings Subscribe to receive notifications for semiannual Individual Permit for Storm Water public meetings. Contact Environmental...

  8. Key Response Planning Factors for the Aftermath of Nuclear Terrorism

    SciTech Connect (OSTI)

    Buddemeier, B R; Dillon, M B

    2009-01-21T23:59:59.000Z

    Despite hundreds of above-ground nuclear tests and data gathered from Hiroshima and Nagasaki, the effects of a ground-level, low-yield nuclear detonation in a modern urban environment are still the subject of considerable scientific debate. Extensive review of nuclear weapon effects studies and discussions with nuclear weapon effects experts from various federal agencies, national laboratories, and technical organizations have identified key issues and bounded some of the unknowns required to support response planning for a low-yield, ground-level nuclear detonation in a modern U.S. city. This study, which is focused primarily upon the hazards posed by radioactive fallout, used detailed fallout predictions from the advanced suite of three-dimensional (3-D) meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory (LLNL), including extensive global Key Response Planning Factors for the Aftermath of Nuclear Terrorism geographical and real-time meteorological databases to support model calculations. This 3-D modeling system provides detailed simulations that account for complex meteorology and terrain effects. The results of initial modeling and analysis were presented to federal, state, and local working groups to obtain critical, broad-based review and feedback on strategy and messaging. This effort involved a diverse set of communities, including New York City, National Capitol Regions, Charlotte, Houston, Portland, and Los Angeles. The largest potential for reducing casualties during the post-detonation response phase comes from reducing exposure to fallout radiation. This can be accomplished through early, adequate sheltering followed by informed, delayed evacuation.B The response challenges to a nuclear detonation must be solved through multiple approaches of public education, planning, and rapid response actions. Because the successful response will require extensive coordination of a large number of organizations, supplemented by appropriate responses by local responders and the general population within the hazard zones, regional planning is essential to success. The remainder of this Executive Summary provides summary guidance for response planning in three areas: (1) Public Protection Strategy details the importance of early, adequate shelter followed by informed evacuation. (2) Responder Priorities identify how to protect response personnel, perform regional situational assessment, and support public safety. (3) Key Planning Considerations refute common myths and provide important information on planning how to respond in the aftermath of nuclear terrorism.

  9. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  10. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, D.E.

    1995-10-31T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  11. Quantum repeaters and quantum key distribution: the impact of entanglement distillation on the secret key rate

    E-Print Network [OSTI]

    Sylvia Bratzik; Silvestre Abruzzo; Hermann Kampermann; Dagmar Bruß

    2013-03-14T23:59:59.000Z

    We investigate quantum repeaters in the context of quantum key distribution. We optimize the secret key rate per memory per second with respect to different distillation protocols and distillation strategies. For this purpose, we also derive an analytical expression for the average number of entangled pairs created by the quantum repeater, including classical communication times for entanglement swapping and entanglement distillation. We investigate the impact of this classical communication time on the secret key rate. We finally study the effect of the detector efficiency on the secret key rate.

  12. NETL: Key Staff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgenda Workshop AgendaGraphic of aEnergy SystemsKey

  13. NSR Key Number Retrieval

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota PriusNSR Key Number Retrieval Pease

  14. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  15. Team Building Toolkit KEYS -Keys to Enhance Your Supervisory Success

    E-Print Network [OSTI]

    Walker, Matthew P.

    Team Building Toolkit KEYS - Keys to Enhance Your Supervisory Success University of California to Enhance Your Supervisory Success 2 | P a g e Table of Contents Stages of Team Development ................................................................................................ 4 Team Building at a Glance

  16. Modified Bennett-Brassard 1984 Quantum Key Distribution With Two-way Classical Communications

    E-Print Network [OSTI]

    Kai Wen; Gui Lu Long

    2005-08-27T23:59:59.000Z

    The quantum key distribution protocol without public announcement of bases is equipped with a two-way classical communication symmetric entanglement purification protocol. This modified key distribution protocol is unconditionally secure and has a higher tolerable error rate of 20%, which is higher than previous scheme without public announcement of bases.

  17. Downtown Boston : a public place

    E-Print Network [OSTI]

    Meiklejohn, Robert

    1984-01-01T23:59:59.000Z

    This thesis explores the physical and experiential qualities of public space in downtown Boston. Streets are the dominant element of urban public space; other elements include plazas , squares, promenades, alleys and parks. ...

  18. West Berkeley Public Library

    High Performance Buildings Database

    Berkeley, CA The West Berkeley Public Library, first opened in December 2013, is the first publicly funded Zero Net Energy public library in California. The library takes advantage of many innovative technologies and passive design strategies to achieve its Zero Net Energy goals. The project's Building Team, led by Harley Ellis Deveraux, partnered with PG&E's Savings By Design program to perform early-stage design analyses including climate modeling, computational fluid dynamics, daylighting, solar modeling, and energy simulations.

  19. Public Engagement and Forestry: Key Lessons for Working in

    E-Print Network [OSTI]

    by more focused involvement with smaller groups of people. 5. Experience shows that a variety of methods of raising the profile of a site and providing information to large numbers of people; · it is not easy the importance of communication, ranging from information to participation/power sharing between stakeholders

  20. A Distributed Public Key Caching Scheme in Large Wireless Networks

    E-Print Network [OSTI]

    Deng, Jing

    -constrained, in terms of computational power, battery energy, and on-board memory space. For example, the prototype

  1. 2014 CATEE: Collaboration is the Key- Public/Private Partnerships

    E-Print Network [OSTI]

    Lin, L.

    2014-01-01T23:59:59.000Z

    Buildings Challenge Houston Green Office Challenge Green Building Resolution LED Streetlight conversion Residential Energy Efficiency Program (REEP) City EE and Resource Management policy City facility benchmarking & transparency HOUSTON CITY ENERGY... usage by 74 million gallons ? Diverted 40 percent of waste from landfills by recycling ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Building Retrofits & Benchmarking ? Smith & Associates installed a...

  2. New Public-Key Cryptosystem Using Braid Groups

    E-Print Network [OSTI]

    Cheon, Jung Hee

    cryptography proposed by Bennet and Brassard [4] and the lattice cryptography proposed by Goldreich, Goldwasser

  3. Key Publications - Natural Gas Regulation | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » MethaneJohnson ControlsJoyce

  4. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estčve; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23T23:59:59.000Z

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  5. Key Associados Bradesco JV | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |Jilin Zhongdiantou New EnergyKenosistec SrlKenyonKetchikan PublicKey

  6. One-way quantum key distribution: Simple upper bound on the secret key rate

    SciTech Connect (OSTI)

    Moroder, Tobias; Luetkenhaus, Norbert [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany); Institute for Quantum Computing, University of Waterloo, 200 University Avenue West, Waterloo, Ontario, N2L 3G1 (Canada); Curty, Marcos [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany)

    2006-11-15T23:59:59.000Z

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol.

  7. EIA Publications Directory 1993

    SciTech Connect (OSTI)

    Not Available

    1994-07-18T23:59:59.000Z

    This directory contains abstracts and ordering information for EIA publications released in the above time period. The abstracts are arranged by broad subject category such as coal, petroleum, natural gas, and electric power. A comprehensive subject index, a title index, and a report number index are included. Each entry gives the title, report number, publication frequency, date, number of pages, and ordering information.

  8. Electric Power Monthly, August 1990. [Glossary included

    SciTech Connect (OSTI)

    Not Available

    1990-11-29T23:59:59.000Z

    The Electric Power Monthly (EPM) presents monthly summaries of electric utility statistics at the national, Census division, and State level. The purpose of this publication is to provide energy decisionmakers with accurate and timely information that may be used in forming various perspectives on electric issues that lie ahead. Data includes generation by energy source (coal, oil, gas, hydroelectric, and nuclear); generation by region; consumption of fossil fuels for power generation; sales of electric power, cost data; and unusual occurrences. A glossary is included.

  9. A Remark on Secret-Key Generation over Correlated Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    A Remark on Secret-Key Generation over Correlated Fading Channels Ashish Khisti ECE Dept. Univ@ee.ucla.edu Abstract-- We study secret-key agreement with public discussion over a flat-fading wiretap channel model. INTRODUCTION In recent years there has been a significant interest in developing secret-key agreement protocols

  10. The Graduate School PA Public Administration

    E-Print Network [OSTI]

    MacAdam, Keith

    The Graduate School PA Public Administration KEY: # = new course * = course changed = course an overview of information strategies and management approaches to government functions and public policy, and training in the health care sector. Prereq: MHA program status. PA 631 PUBLIC FINANCIAL MANAGEMENT. (3

  11. Public Utilities (Florida)

    Broader source: Energy.gov [DOE]

    Chapter 366 of the Florida Statutes governs the operation of public utilities, and includes a section pertaining to cogeneration and small power production (366.051). This section establishes the...

  12. Diversity & Flexibility Key to Sustainability

    Broader source: Energy.gov [DOE]

    Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting MisconceptionsDiversity & Flexibility Key to SustainabilityDavid Babson, Senior Fuels Engineer, Union of...

  13. Putting cancer in focusPathologists key to picking the

    E-Print Network [OSTI]

    Eichman, Brandt F.

    Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

  14. Families First: Keys to Successful Family Functioning An Introduction

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    . publication 350-090 #12;KEY CHARACTERISTICS OF HEALTHY FAMILIES Research has identified several; and the aging family. Crisis tasks are family hardship events such as ill- ness, job loss, accidents, relocation Virginia Cooperative Extension programs and employment are open to all, regardless of race, color, national

  15. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  16. Quantum key distribution with key extracted from basis information

    E-Print Network [OSTI]

    Xiongfeng Ma

    2014-10-20T23:59:59.000Z

    In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

  17. ORNL Publications External Publication

    E-Print Network [OSTI]

    Pennycook, Steve

    /Responsibilities - Conducts catalytic testing using a high-pressure gas-phase reactor and a plug-flow reactor which operates Office (which includes Word, PowerPoint, and Excel,) required. Proven ability to function well in a fast

  18. Finite key analysis for symmetric attacks in quantum key distribution

    SciTech Connect (OSTI)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2006-10-15T23:59:59.000Z

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.

  19. Energy Technology Solutions: Public-Private Partnerships Transforming...

    Broader source: Energy.gov (indexed) [DOE]

    itpsuccesses.pdf More Documents & Publications Energy Technology Solutions ITP Energy Intensive Processes: Energy-Intensive Processes Portfolio: Addressing Key Energy Challenges...

  20. Public Project Revolving Fund (PPRF) (New Mexico)

    Broader source: Energy.gov [DOE]

    The New Mexico Finance Authority’s Public Project Revolving Fund (PPRF) funds infrastructure and capital equipment projects with low-cost and low-interest rate loans.  The key characteristics of...

  1. Public-policy responsibilities in a restructured electricity industry

    SciTech Connect (OSTI)

    Tonn, B.; Hirst, E.; Bauer, D.

    1995-06-01T23:59:59.000Z

    In this report, we identify and define the key public-policy values, objectives, and actions that the US electricity industry currently meets. We also discuss the opportunities for meeting these objectives in a restructured industry that relies primarily on market forces rather than on government mandates. And we discuss those functions that governments might undertake, presumably because they will not be fully met by a restructured industry on its own. These discussions are based on a variety of inputs. The most important inputs came from participants in an April 1995 workshop on Public-Policy Responsibilities and Electric Industry Restructuring: Shaping the Research Agenda. Other sources of information and insights include the reviews of a draft of this report by workshop participants and others and the rapidly growing literature on electric-industry restructuring and its implications. One of the major concerns about the future of the electricity industry is the fate of numerous social and environmental programs supported by today`s electric utilities. Many people worry that a market-driven industry may not meet the public-policy objectives that electric utilities have met in the past. Examples of potentially at-risk programs include demand-side management (DSM), renewable energy, low-income weatherization, and fuel diversity. Workshop participants represented electric utilities, public utility commissions (PUCs), state energy offices, public-interest groups, other energy providers, and the research community.

  2. Public Service "The Minor That Matters"

    E-Print Network [OSTI]

    degree. Employees in public service have the opportunity to: vdeliver and manage public programs vaddressMinorThatMatters" TAKEYOURCAR EER IN ANENTIRE LY NEW DIRECTION #12;Public Service...The Minor That Matters Purpose of the Minor designed to provide a solid foundation in public administration and non-profit management, including

  3. Key Issues | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues Key

  4. Countries Gasoline Prices Including Taxes

    Gasoline and Diesel Fuel Update (EIA)

    Selected Countries (U.S. dollars per gallon, including taxes) Date Belgium France Germany Italy Netherlands UK US 51115 6.15 6.08 6.28 6.83 6.96 6.75 3.06 5415 6.14 6.06...

  5. Sponsorship includes: Agriculture in the

    E-Print Network [OSTI]

    Nebraska-Lincoln, University of

    Sponsorship includes: · Agriculture in the Classroom · Douglas County Farm Bureau · Gifford Farm · University of Nebraska Agricultural Research and Development Center · University of Nebraska- Lincoln Awareness Coalition is to help youth, primarily from urban communities, become aware of agriculture

  6. Secret Key Generation From Mobility Onur Gungor, Fangzhou Chen, C. Emre Koksal

    E-Print Network [OSTI]

    Koksal, Can Emre

    Secret Key Generation From Mobility Onur Gungor, Fangzhou Chen, C. Emre Koksal Department of Electrical and Computer Engineering The Ohio State University, Columbus, 43210 Abstract--We consider secret of these beacons; in the second phase, nodes generate secret key bits via a public discussion. Our problem can

  7. ABBREVIATION KEY EMPH EXECUTIVE MPH

    E-Print Network [OSTI]

    Lin, Qiao

    FULLTIME MANAGEMENT FTP FULLTIME POLICY GLOBAL GLOBAL HEALTH POLICY & MANAGEMENT HPM HAVE YOU HEARD 13 HPM HIGHLIGHTS 16 Practicum Day "understand how public health% of fulltime students entering HPM have never worked in a professional setting. To prepare students to enter

  8. ABBREVIATION KEY EMPH EXECUTIVE MPH

    E-Print Network [OSTI]

    Grishok, Alla

    HPM DEPARTMENT OF HEALTH POLICY & MANAGEMENT MSPH MAILMAN SCHOOL OF PUBLIC HEALTH PTM Fall 2013 ISSUE 4 A Health Policy & Management Newsletter IN THIS ISSUE: HPM PAST & PRESENT 1 ALUMNI PROFILE 6 FACULTY CORNER 8 HAVE YOU HEARD 9 BOOK NOOK 10 HPM HIGHLIGHTS 11

  9. ABBREVIATION KEY EMPH EXECUTIVE MPH

    E-Print Network [OSTI]

    Qian, Ning

    & MANAGEMENT HPM DEPARTMENT OF HEALTH POLICY & MANAGEMENT MSPH MAILMAN SCHOOL OF PUBLIC HEALTH |COLUMBIA UNIVERSITY May 2013 ISSUE 3 A Health Policy & Management Newsletter IN THIS ISSUE: HPM Q&A WITH SUSAN COHEN 9 FACULTY CORNER 11 HAVE YOU HEARD 12 HPM HIGHLIGHTS 14 HPM

  10. Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

  11. Public information plan. Version 2

    SciTech Connect (OSTI)

    NONE

    1993-09-22T23:59:59.000Z

    The Public Information Plan is intended to be used in conjunction with the U.S. Department of Energy (DOE) Uranium Mill Tailings Remedial Action (UMTRA) Project Public Participation Plan. The Public Participation Pion describes the DOE procedure for involving the public in the decision-making process related to the UMTRA Project during the stages at which public participation is required and solicited. This Public Information Plan describes the department`s procedure for communicating with the public about project policies, plans, and activities. Together, these complementary plans describe the DOE public affairs program for the UMTRA Project. This project was authorized by Congress in the Uranium Mill Tailings Radiation Control Act (UMTRCA) of 1978, (Public Law (PL) 95-6041), as amended. The Act provides for a cooperative effort with affected states and Indian tribes for the cleanup of designated abandoned or inactive uranium mill tailings sites, which are located in 10 states, 9 of them west of the Mississippi River. The public has a right to know about proposed government actions and to be heard in the planning of activities that influence their lives. The UMTRA Project is unclassified and the DOE provides accurate information about policy and project activities to interested stakeholders, including the news media, in a timely way. The DOE encourages states and local governments, as well as individuals, to join actively in the decision-making process. This is intended to ensure that the resulting decisions are made with full knowledge of the public`s views and that these decisions address the public`s concerns to the extent possible within the law. The DOE, through the implementation of the Public Information Plan, keeps the public informed on matters such as health concerns, environmental issues, remedial action construction plans, project costs, and specific site activities.

  12. Essays in public economics and political economy

    E-Print Network [OSTI]

    Pinkovskiy, Maxim L

    2013-01-01T23:59:59.000Z

    This thesis studies topics in public economics in developed and developing countries, including health insurance regulation, public goods provision and inequality and welfare measurement. The first chapter analyzes the ...

  13. Public policy-making and research information

    E-Print Network [OSTI]

    Seekins, Tom; Fawcett, Stephen B.

    1986-01-01T23:59:59.000Z

    Discusses the types of information that behavioral researchers might provide to public policymakers and how it might be delivered in order to shape public policy. The stages of policymaking, including agenda formation, ...

  14. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15T23:59:59.000Z

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  15. Key Opportunities and Challenges for Program Sustainability ...

    Energy Savers [EERE]

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  16. NREL: Publications Home Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Publications Photo of the cover of several NREL publications. The NREL Publications Database contains bibliographic information about publications developed or written by NREL...

  17. Strategy for advancement of IRP in public power, Volume 2: Technical appendices

    SciTech Connect (OSTI)

    Garrick, C.J. [Garrick & Associates, Morrison, CO (United States)

    1995-10-01T23:59:59.000Z

    NREL and subcontractor Garrick & Associates are conducting the Advancement of integrated resource planning (IRP) in Public Power Program, sponsored by DOE. The program is intended to develop a consistent strategy for DOE to advance IRP practices in the publicly and cooperatively owned utility sector. The IRP advancement program includes two major tasks: key participant involvement and strategy development. The Program`s initial task is to involve key public and cooperative utility organizations and their constituents in the development of the IRP advancement strategy. Key Participant Involvement is accomplished through two distinct subtasks: Needs Assessment and Steering Committee Involvement. The Needs Assessment identifies key participant needs, expectations, common interests, issues, and divergences that must be addressed by the IRP program. The results of this effort, which are presented in this {open_quotes}Needs Assessment Summary Report,{close_quotes} provide a foundation for the specific strategy development efforts conducted later in the IRP project. The remaining sections of this report present the approach to the Needs Assessment subtask and summarize the findings of this effort.

  18. NREL: Energy Analysis - Key Activities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency Visit | NationalWebmaster To contactK-12BSM -JEDI JobsKey

  19. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKeyAbout

  20. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyThe

  1. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyTheThe

  2. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17T23:59:59.000Z

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  3. COLLEGE AVE CAMPUS (CAC) KEY PICK UP

    E-Print Network [OSTI]

    COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

  4. Publication Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclear Press Releases ArchiveServicesPublication Policy Publication

  5. On the security of some password-based key agreement schemes

    E-Print Network [OSTI]

    on Jablon's scheme, namely the first password- based key agreement mechanism in ISO/IEC FCD 11770 further show that other password-based key agreement mechanisms, including those in ISO/IEC FCD 11770 a session key, they first compute g = pw2 mod p. Note that in the first mechanism of ISO/IEC FCD 11770-4 [19

  6. Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates

    E-Print Network [OSTI]

    Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates Key environmental conditions. Key environmental correlates are the finest scale features that help to define wildlife habitat the environmental correlates exert of the realized fitness of a species (Johnson and O'Neil 2001). They include

  7. Distribution and abundance of endangered Florida Key deer on outer islands

    E-Print Network [OSTI]

    Watts, Dominque Elijah

    2007-04-25T23:59:59.000Z

    parameters has limited status assessment and management of Key deer on outer islands. Traditional survey techniques for Key deer on Big Pine and No Name keys include road-counts, strip-counts, and mark-recapture methods. However, practical limitations render...

  8. Strategy for advancement of IRP in public power, Volume 1: IRP advancement strategy

    SciTech Connect (OSTI)

    Garrick, C.J. [Garrick & Associates, Morrison, CO (United States)

    1995-10-01T23:59:59.000Z

    The nation`s 3,000 publicly and cooperatively owned utilities have a documented need for assistance in integrated resource planning (IRP) and related strategic business planning practices. The availability of appropriate and sufficient assistance will be an important factor influencing the ability of these utilities to face the challenges and opportunities of today`s competitive electric utility environment. The U.S. Department of Energy (DOE) actively supports IRP advancement in the investor-owned utility (IOU) sector. This is accomplished through multiple vehicles, including grant funding to the state energy offices, to the National Conference of State Legislatures (NCSL), and to the National Association of Regulatory Utility Commissioners (NARUC). However, public utilities typically are not impacted by these DOE efforts. As consumer-controlled organizations, many publicly and cooperatively owned utilities are not regulated by state public utility commissions (PUCs). To advance IRP as an essential approach for publicly and cooperatively owned utility operation in a drastically changing industry, DOE must develop additional vehicles of assistance, including the federal power agencies and key industry organizations such as the American Public Power Association (APPA) and the National Rural Electric Cooperatives Association (NRECA).

  9. Public Sector Energy Efficiency Aggregation Program

    Broader source: Energy.gov [DOE]

    The Illinois Department of Commerce and Economic Opportunity (DCEO) administers the Illinois Energy Now programs, including the Public Sector Energy Efficiency Aggregation Program. The program will...

  10. Public Service Companies, General Provisions (Virginia)

    Broader source: Energy.gov [DOE]

    Public Service Companies includes gas, pipeline, electric light, heat, power and water supply companies, sewer companies, telephone companies, and all persons authorized to transport passengers or...

  11. Public views on multiple dimensions of security : nuclear waepons, terrorism, energy, and the environment : 2007.

    SciTech Connect (OSTI)

    Herron, Kerry Gale (University of Oklahoma, Norman, OK); Jenkins-Smith, Hank C. (University of Oklahoma, Norman, OK)

    2008-01-01T23:59:59.000Z

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.

  12. Level of Preparedness for Pandemic Influenza among Key Leaders in Brazos County

    E-Print Network [OSTI]

    Kaster, Elizabeth

    2012-02-14T23:59:59.000Z

    categorized into vaccinations, communication, logistical issues, and the need for evaluations and feedback. Recommendations for increasing preparedness include addressing contingency plans, increasing education through public health efforts, addressing...

  13. Answering Key Fuel Cycle Questions

    SciTech Connect (OSTI)

    Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

    2003-10-01T23:59:59.000Z

    The Advanced Fuel Cycle Initiative (AFCI) program has both “outcome” and “process” goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the “energy future.” Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: · What are the AFCI program goals? · Which potential waste disposition approaches do we plan for? · What are the major separations, transmutation, and fuel options? · How do we address proliferation resistance? · Which potential energy futures do we plan for? · What potential external triggers do we plan for? · Should we separate uranium? · If we separate uranium, should we recycle it, store it or dispose of it? · Is it practical to plan to fabricate and handle “hot” fuel? · Which transuranic elements (TRU) should be separated and transmuted? · Of those TRU separated, which should be transmuted together? · Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? · Should we separate and/or transmute very long-lived Tc and I isotopes? · Which separation technology? · What mix of transmutation technologies? · What fuel technology best supports the above decisions?

  14. Public Interaction and Educational Outreach on the Yucca Mountain Project

    SciTech Connect (OSTI)

    A. Benson; Y. Riding

    2002-11-14T23:59:59.000Z

    In July 2002, the U.S. Congress approved Yucca Mountain in Nevada as the nation's first long-term geologic repository site for spent nuclear fuel and high-level radioactive waste. This major milestone for the country's high-level radioactive waste disposal program comes after more than twenty years of scientific study and intense public interaction and outreach. This paper describes public interaction and outreach challenges faced by the U.S. Department of Energy's (DOE) Yucca Mountain Project in the past and what additional communication strategies may be instituted following the July 2002 approval by the U.S. Congress to develop the site as the nation's first long-term geologic repository for spent nuclear fuel and high-level radioactive waste. The DOE public involvement activities were driven by two federal regulations--the National Environmental Policy Act (NEPA) and the Nuclear Waste Policy Act (NWPA) of 1982, as amended. The NEPA required that DOE hold public hearings at key points in the development of an Environmental Impact Statement (EIS) and the NWPA required the agency to conduct public hearings in the vicinity of the site prior to making a recommendation regarding the site's suitability. The NWPA also provided a roadmap for how DOE would interact with affected units of government, which include the state of Nevada and the counties surrounding the site. Because the Department anticipated and later received much public interest in this high-profile project, the agency decided to go beyond regulatory-required public involvement activities and created a broad-based program that implemented far-reaching public interaction and outreach tactics. Over the last two decades, DOE informed, educated, and engaged a myriad of interested local, national, and international parties using various traditional and innovative approaches. The Yucca Mountain Project's intensive public affairs initiatives were instrumental in involving the public, which in turn resulted in thousands of comments on various aspects of the program. These comments were considered in the development of the EIS and weighed in the Secretary of Energy's decision to recommend the site.

  15. Public Lecture

    ScienceCinema (OSTI)

    None

    2011-10-06T23:59:59.000Z

    An outreach activity is being organized by the Turkish community at CERN, on 5 June 2010 at CERN Main Auditorium. The activity consists of several talks that will take 1.5h in total. The main goal of the activity will be describing the CERN based activities and experiments as well as stimulating the public's attention to the science related topics. We believe the wide communication of the event has certain advantages especially for the proceeding membership process of Turkey.

  16. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Patents [OSTI]

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09T23:59:59.000Z

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  17. Generalized decoding, effective channels, and simplified security proofs in quantum key distribution

    SciTech Connect (OSTI)

    Renes, Joseph M. [IAKS Prof. Beth, Arbeitsgruppe Quantum Computing, Universitaet Karlsruhe, Am Fasanengarten 5, D-76131 Karlsruhe (Germany); Quantum Information Theory Group, Institut fuer Theoretische Physik I, and Max-Planck-Forschungsgruppe, Institut fuer Optik, Information und Photonik, Universitaet Erlangen-Nuernberg, Staudtstrasse 7, D-91058 Erlangen (Germany); Grassl, Markus [IAKS Prof. Beth, Arbeitsgruppe Quantum Computing, Universitaet Karlsruhe, Am Fasanengarten 5, D-76131 Karlsruhe (Germany)

    2006-08-15T23:59:59.000Z

    Prepare and measure quantum key distribution protocols can be decomposed into two basic steps: delivery of the signals over a quantum channel and distillation of a secret key from the signal and measurement records by classical processing and public communication. Here we formalize the distillation process for a general protocol in a purely quantum-mechanical framework and demonstrate that it can be viewed as creating an 'effective' quantum channel between the legitimate users Alice and Bob. The process of secret key generation can then be viewed as entanglement distribution using this channel, which enables application of entanglement-based security proofs to essentially any prepare and measure protocol. To ensure secrecy of the key, Alice and Bob must be able to estimate the channel noise from errors in the key, and we further show how symmetries of the distillation process simplify this task. Applying this method, we prove the security of several key distribution protocols based on equiangular spherical codes.

  18. Lightweight Key Establishment for Distributed Networking Environments

    E-Print Network [OSTI]

    Martin, Keith

    / COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

  19. The U.S. ISO Key Project on Quasars

    E-Print Network [OSTI]

    Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

    1998-09-22T23:59:59.000Z

    Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

  20. A publication of the Airport Technical Assistance Program of the Center for Transportation Studies at the University of Minnesota Winter 2014 Vol. 14, No. 1 For more on the Fall Forum, including video highlights, see www.AirTAP.umn.edu.

    E-Print Network [OSTI]

    Amin, S. Massoud

    at the University of Minnesota Winter 2014 Vol. 14, No. 1 Briefings For more on the Fall Forum, including video department. That full-time staff is augmented with 28 heavy equipment operators in the winter who work got a look at how the airport handles the snow and ice that's part of a typical Minnesota winter

  1. Publication Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclear Press Releases ArchiveServicesPublication Policy

  2. Publications - SRSCRO

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclear Press Releases ArchiveServicesPublicationPublicationsnuclear

  3. Publications | NREL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclear Press Releases 2014 2013 2012 2011 2010Publications The NREL

  4. Publications Archive

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeedingTechnical News,Program90803|Publications

  5. Public Attitudes and Elite Discourse in the Realm of Biofuels

    Broader source: Energy.gov [DOE]

    Breakout Session 3D—Building Market Confidence and Understanding III: Engaging Key Audiences in Bioenergy Public Attitudes and Elite Discourse in the Realm of Biofuels Ashlie B. Delshad, Assistant Professor of Political Science, West Chester University of Pennsylvania

  6. Selected DOE headquarters publications, October 1979

    SciTech Connect (OSTI)

    None

    1980-05-01T23:59:59.000Z

    This publication provides cumulative listings of and an index to DOE headquarters publications issued since October 1979. (Publications issued during October 1977-September 1979 are covered in DOE/AD-0010/6). Three types of headquarters publications are included: publications dealing mainly with program and policy that are attributed to and issued by headquarters organizations, reports prepared by contractors to describe research and development work they have performed for the Department, and environmental development plans and impact statements. Certain publications are omitted. They include such items as pamphlets, fact sheets, bulletins, newsletters, telephone directories, publications issued under the DOE-tr and CONF codes, technical reports from the Jet Propulsion Laboratory and NASA issued under DOE/JPL and DOE/NASA codes, and weekly/monthly reports of the Energy Information Administration. (RWR)

  7. Selected DOE Headquarters publications, October 1979-

    SciTech Connect (OSTI)

    None

    1980-11-01T23:59:59.000Z

    This publication provides a cumulative listing of and an index to DOE headquarters publications issued since October 1979. (Publications issued during October 1977 to September 1979 are covered in DOE/AD-0010/6.) Three types of headquarters publications are included: publications dealing mainly with program and policy that are attributed to and issued by headquarters organizations, reports prepared by contractors (and published by DOE) to describe research and development work they have performed for the Department, and environmental development plans, environmental impact statements, and environmental readiness documents. Certain publications have been omitted. They include such items as pamphlets, fact sheets, bulletins, newsletters, and telephone directories. Also omitted are weekly/monthly reports of the Energy Information Administration and headquarters publications issued under the DOE-tr and CONF codes. (RWR)

  8. Selected DOE Headquarters Publications, October 1979

    SciTech Connect (OSTI)

    None

    1980-09-01T23:59:59.000Z

    This publication provides cumulative listings of and an index to DOE headquarters publications issued since October 1979. (Publications issued during October 1977-September 1979 are covered in DOE/AD-0010/6.) Three types of headquarters publications are included: publications dealing mainly with program and policy that are attributed to and issued by headquarters organizations, reports prepared by contractors (and published by DOE) to describe research and development work they have performed for the Department, and environmental development plans and impact statements. Certain publications have been omitted. They include such items as pamphlets, fact sheets, bulletins, newsletters, and telephone directories, headquarters publications issued under the DOE-tr and CONF codes, technical reports from the Jet Propulsion Laboratory and NASA issued under DOE/JPL and DOE/NASA codes, and weekly/monthly reports of the Energy Information Administration. (RWR)

  9. Counterfactual quantum key distribution with high efficiency

    SciTech Connect (OSTI)

    Sun Ying [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Beijing Electronic Science and Technology Institute, Beijing 100070 (China); Wen Qiaoyan [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2010-11-15T23:59:59.000Z

    In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.

  10. DCLL TBM Safety Assessment A key objective for ITER includes integrated testing of blanket concepts suitable for demonstrating fusion

    E-Print Network [OSTI]

    prototypical blanket modules into designated ports. Because ITER will be a licensed nuclear facility, occupation radiation exposure (ORE) analyzed, and decommissioning and waste disposal analysis performed

  11. Publications of LASL research, 1979

    SciTech Connect (OSTI)

    Willis, J.K.; Salazar, C.A. (comps.)

    1980-11-01T23:59:59.000Z

    This bibliography is a compilation of unclassified publications of work done at the Los Alamos Scientific Laboratory for 1979. Papers published in 1979 are included regardless of when they were actually written. Declassification of previously classified reports is considered to constitute publication. All classified issuances are omitted. If a paper was published more than once, all places of publication are included. The bibliography includes Los Alamos Scientific Laboratory reports, papers released as non-LASL reports, journal articles, books, chapters of books, conference papers (whether published separately or as part of conference proceedings issued as books or reports), papers published in congressional hearings, theses, and US patents. The entries are arranged in sections by broad subject categories. (RWR)

  12. Florida Keys Electric Cooperative- Residential Rebate Program

    Broader source: Energy.gov [DOE]

    Florida Keys Electric Cooperative offers residential members rebates for installing energy efficient measures. To qualify for rebates, members must first call FKEC and make an appointment for a...

  13. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  14. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01T23:59:59.000Z

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  15. Publications, 1977 through 1980. [Bibliography

    SciTech Connect (OSTI)

    Hilborn, H.S. (comp.)

    1981-04-01T23:59:59.000Z

    This is a compilation of documents that communicate the results of scientific and technical work done at Savannah River. The compilation includes those documents that have been published (research and development reports, journal articles, book chapters, etc.), and documents that have been announced in Energy Research Abstracts. Where applicable the meeting at which the paper was presented is given. The information was compiled by machine methods to produce bibliographic, subject, and author listings. This report updates the information included in DP-929, Rev. 2, Publications, 1951 through 1971 and DP-929-1, Publications, 1972 through 1976, and replaces DP-929-1, Supplement 3.

  16. Wind Vision: Analysis Highlights and Key Results

    Wind Powering America (EERE)

    aviation & radar, public acceptance, etc. BENEFITS * Greenhouse gas emissions reduction * Air pollution impacts * Water usage reduction IMPACTS * Energy diversity and risk...

  17. Publications of Los Alamos Research 1982

    SciTech Connect (OSTI)

    McClary, W.J.; Rodriguez, L.L.; Sheridan, C.J. (comps.)

    1983-10-01T23:59:59.000Z

    This bibliography is a compilation of unclassified publications of work done at the Los Alamos National Laboratory for 1982. Papers published in 1982 are included regardless of when they were actually written. Publications received too late for inclusion in earlier compilations have also been listed. Declassfiication of previously classified reports is considered to constitute publication. All classified issuances are omitted - even those papers, themselves unclassified, which were published only as part of a classified document. If a paper was published more than once, all places of publication are included. The bibliography includes Los Alamos National Laboratory reports, papers released as non-Laboratory reports, journal articles, books, chapters of books, conference papers either published separately or as part of conference proceedings issued as books or reports, papers published in congressional hearings, theses, and US patents. Publications by Los Alamos authors that are not records of Laboratory-sponsored work are included when the Library becomes aware of them.

  18. Publications of Los Alamos research 1980

    SciTech Connect (OSTI)

    Salazar, C.A.; Willis, J.K. (comps.)

    1981-09-01T23:59:59.000Z

    This bibliography is a compilation of unclassified publications of work done at the Los Alamos National Laboratory for 1980. Papers published in 1980 are included regardless of when they were actually written. Publications received too late for inclusion in earlier compilations have also been listed. Declassification of previously classified reports is considered to constitute publication. All classified issuances are omitted-even those papers, themselves unclassified, which were published only as part of a classified document. If a paper was pubished more than once, all places of publication are included. The bibliography includes Los Alamos National Laboratory reports, papers released as non-laboratory reports, journal articles, books, chapters of books, conference papers published either separately or as part of conference proceedings issued as books or reports, papers published in congressional hearings, theses, and US patents. Publications by Los Alamos authors that are not records of Laboratory-sponsored work are included when the Library becomes aware of them.

  19. Publications of Los Alamos Research, 1983

    SciTech Connect (OSTI)

    Sheridan, C.J.; McClary, W.J.; Rich, J.A.; Rodriguez, L.L. (comps.)

    1984-10-01T23:59:59.000Z

    This bibliography is a compilation of unclassified publications of work done at the Los Alamos National Laboratory for 1983. Papers published in 1982 are included regardless of when they were actually written. Publications received too late for inclusion in earlier compilations have also been listed. Declassification of previously classified reports is considered to constitute publication. All classified issuances are omitted - even those papers, themselves unclassified, which were published only as part of a classified document. If a paper was published more than once, all places of publication are included. The bibliography includes Los Alamos National Laboratory reports, papers released as non-Laboratory reports, journal articles, books, chapters of books, conference papers either published separately or as part of conference proceedings issued as books or reports, papers publishd in congressional hearings, theses, and US patents. Publications by Los Alamos authors that are not records of Laboratory-sponsored work are included when the Library becomes aware of them.

  20. RECOMMENDATIONS FOR SPECIALIZATIONS IN ECONOMICS Economics graduates pursue many different careers including careers in economics consulting, finance, and

    E-Print Network [OSTI]

    Gilchrist, James F.

    including careers in economics consulting, finance, and public policy. Economics graduates also go on to M Economics #12;ECO 311 Environmental Economics ECO 353 Public Finance: Federal ECO 354 Public Finance: State International Finance ECO 295 Microfinance ECO 395 Political Economy of Iraq Recommended courses beyond those

  1. Secure key distribution by swapping quantum entanglement

    SciTech Connect (OSTI)

    Song, Daegene [National Institute of Standards and Technology, 100 Bureau Drive, MS 8910, Gaithersburg, Maryland 20899 (United States)

    2004-03-01T23:59:59.000Z

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes.

  2. On quantum key distribution using ququarts

    SciTech Connect (OSTI)

    Kulik, S. P., E-mail: Sergei.Kulik@gmail.com; Shurupov, A. P. [Moscow State University (Russian Federation)

    2007-05-15T23:59:59.000Z

    A comparative analysis of quantum key distribution protocols using qubits and ququarts as information carriers is presented. Several schemes of incoherent attacks that can be used by an eavesdropper to obtain secret information are considered. The errors induced by the eavesdropper are analyzed for several key distribution protocols.

  3. An implementation of the Gong-Harn Die-Hellman key agreement protocol

    E-Print Network [OSTI]

    Gong, Guang

    An implementation of the Gong-Harn DiĆe-Hellman key agreement protocol Studienarbeit vorgelegt am and used systems, new approaches with better characteris- tics are still being developed. The Gong-Harn (GH; 1 INTRODUCTION 1 1 Introduction In 1998 and 1999, Gong and Harn proposed a new public

  4. ON THE CONCEPT OF (HOMO)MORPHISM : A KEY NOTION IN THE LEARNING OF ABSTRACT ALGEBRA

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ON THE CONCEPT OF (HOMO)MORPHISM : A KEY NOTION IN THE LEARNING OF ABSTRACT ALGEBRA Thomas Algebra more accessible. I. INTRODUCTION In our context, Abstract Algebra means the discipline devoted to the study of algebraic structures, according to the new paradigm established after the publication of van

  5. Consistent Query Answering Of Conjunctive Queries Under Primary Key Constraints

    E-Print Network [OSTI]

    Pema, Enela

    2014-01-01T23:59:59.000Z

    Queries and Primary Key Constraints . . . . . . . . . .of Employee w.r.t. the primary key SSN ? {name, salary} . .query answering under primary keys: a characterization of

  6. Chernobyl and Fukushima Publications Most Recent Publications

    E-Print Network [OSTI]

    Mousseau, Timothy A.

    Chernobyl and Fukushima Publications Most Recent Publications: Møller, A birds in Chernobyl as judged from biased sex and age ratios. PLoS One, 7. Abundance of birds at Fukushima as judged from Chernobyl. Environmental Pollution

  7. 14.472 Public Economics II, Spring 2002

    E-Print Network [OSTI]

    Diamond, Peter A.

    Theory and evidence on government expenditure policy. Topics include the theory of public goods; education; state and local public goods; political economy; redistribution and welfare policy; social insurance programs such ...

  8. Nutrient Management Examination Competency Areas Commercial and Public Specialists

    E-Print Network [OSTI]

    Guiltinan, Mark

    of the publications and reference materials are included on the Nutrient Management Resource CD distributedv.01.2014 Nutrient Management Examination Competency Areas Commercial and Public Specialists Management Specialist Certification Program. If a person understands the subject matter described

  9. IN NRC PUBLICATIONS NRC Reference Material

    E-Print Network [OSTI]

    Decommissioning Process

    1999-01-01T23:59:59.000Z

    Publicly released records include, to name a few, NUREG-series publications; Federal Register notices; applicant, licensee, and vendor documents and correspondence; NRC correspondence and internal memoranda; bulletins and information notices; inspection and investigative reports; licensee event reports; and Commission papers and their attachments. NRC publications in the NUREG series, NRC regulations, and Title 10, Energy, in the Code of Federal Regulations may also be purchased from one of these two sources.

  10. Selected DOE headquarters publications, October 1979

    SciTech Connect (OSTI)

    None

    1981-03-01T23:59:59.000Z

    A cumulative listing of DOE headquarters publications issued since October 1979 is provided along with an index of title keywords. Three types of headquarters publications have been included: publications dealing mainly with program and policy that are attributed to and issued by headquarters organizations; reports prepared by contractors (and published by DOE headquarters) to describe research and development work they have performed for the department; and environmental development plans, environmental impact statements, and environmental readiness documents. Availabilities of documents are given. (GHT)

  11. ORISE: Public Health Communication

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Communication Public Health Communication The Oak Ridge Institute for Science and Education (ORISE) assists government agencies and organizations in addressing public health...

  12. Public Assembly Buildings

    U.S. Energy Information Administration (EIA) Indexed Site

    center, meeting hall, or convention center a library or museum a transportation terminal a funeral home a broadcasting studio some other type of public assembly Public...

  13. IACT Publications and Presentations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Publications and Presentations Peer-Reviewed Publications Conference Proceedings, Abstracts, Presentations, and Poster Sessions IACT-funded Master and Doctoral Theses September...

  14. Public Art Fund Communications Internship

    E-Print Network [OSTI]

    Shepard, Kenneth

    of these people. Because it's a year-in- review type magazine, we had to make sure to include photos from each publication since it only comes out once a year. Because PAF just got a new, more modern-looking website, the magazine's look was altered a bit this year to fit that streamlined style. One thing I found interest- ing

  15. Key Implications of the Global Economic Environment

    E-Print Network [OSTI]

    Lansky, Joshua

    Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

  16. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01T23:59:59.000Z

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  17. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  18. Mutual Dependence for Secret Key Agreement

    E-Print Network [OSTI]

    Chan, Chung

    A mutual dependence expression is established for the secret key agreement problem when all users are active. In certain source networks, the expression can be interpreted as certain notions of connectivity and network ...

  19. Multipartite secret key distillation and bound entanglement

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-25T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted GHZ structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with help of the privacy squeezing technique.

  20. Multipartite secret key distillation and bound entanglement

    SciTech Connect (OSTI)

    Augusiak, Remigiusz; Horodecki, Pawel [Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland) and ICFO-Institute Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona) (Spain); Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland)

    2009-10-15T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  1. Policy Name: Publications Policy Originating/Responsible

    E-Print Network [OSTI]

    Carleton University

    and University Graphic Services Approval Authority: Senior Management Committee Date of Original Policy: November and Visual Standards Guide. This includes print as well as online publications. The Department of University Communications and University Graphic Services will assist departments upon request to ensure that publications

  2. Portland Public School Children Move with Propane

    SciTech Connect (OSTI)

    Not Available

    2004-04-01T23:59:59.000Z

    This 2-page Clean Cities fact sheet describes the use of propane as a fuel source for Portland Public Schools' fleet of buses. It includes information on the history of the program, along with contact information for the local Clean Cities Coordinator and Portland Public Schools.

  3. CNG a Natural for Tulsa Public Schools

    SciTech Connect (OSTI)

    Not Available

    2004-04-01T23:59:59.000Z

    This 2-page Clean Cities fact sheet describes the use of natural gas power for Tulsa Public Schools' fleet of buses and cars. It includes information on the history of the program, along with contact information for the local Clean Cities Coordinator and Tulsa Public Schools.

  4. Effects of a Highway Improvement Project on Florida key Deer

    E-Print Network [OSTI]

    Parker, Israel D.; Braden, Anthony W.; Lopez, Roel R.; Silvy, Nova J.; Davis, Donald S.; Owen, Catherine B.

    2007-01-01T23:59:59.000Z

    the primary inter-island roadway in the Florida Keys. DVCsprimary source of mortality for the endangered Florida Key

  5. C3E also includes a network of leaders from the public, private, non-profit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platformBuilding Removal Ongoing atGreenhouse GasesRespond toTable o f

  6. Title 16 USC 818 Public Lands Included in Project - Reservation of Lands

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro Industries PvtStratosolarTharaldson EthanolTillson, New5661°,Open470a HistoricCancellation

  7. MHK technologies include current energy conversion

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    research leverages decades of experience in engineering and design and analysis (D&A) of wind power technologies, and its vast research complex, including high-performance...

  8. Privatizing Public Interest Law

    E-Print Network [OSTI]

    Cummings, Scott L

    2011-01-01T23:59:59.000Z

    graduation, she received a public interest law foundation grant to work in the consumer rights project

  9. Coastal Public Lands Management Act (Texas)

    Broader source: Energy.gov [DOE]

    The coastal public lands of the state are managed in accordance with the following principles: (a) The natural resources of the surface land, including their aesthetic value and their ability to...

  10. College of Charleston POLI 210.01: Introduction to Public Administration

    E-Print Network [OSTI]

    Young, Paul Thomas

    , the evolution of the discipline from public administration to new public management to new public governance that must be navigated for public managers to solve organizational problems including the management1 College of Charleston Fall 2013 POLI 210.01: Introduction to Public Administration 3 credit hours

  11. Elena M. Miller Public Adviser

    E-Print Network [OSTI]

    -examine witnesses provided by other parties #12;Elena M. Miller, Public Adviser Nick Bartsch, Public Adviser

  12. Rangeland Drought Management for Texans: Planning: The Key to Surviving Drought

    E-Print Network [OSTI]

    Hart, Charles R.; Carpenter, Bruce B.

    2001-05-02T23:59:59.000Z

    This publication outlines the steps that ranchers should take to survive a drought. Those steps include developing a plan for each enterprise of the operation, ranking strategic ranch goals, planning for resource flow, implementing and monitoring...

  13. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    SciTech Connect (OSTI)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15T23:59:59.000Z

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  14. Reference-frame-independent quantum key distribution

    SciTech Connect (OSTI)

    Laing, Anthony; Rarity, John G.; O'Brien, Jeremy L. [Centre for Quantum Photonics, H. H. Wills Physics Laboratory and Department of Electrical and Electronic Engineering, University of Bristol, BS8 1UB (United Kingdom); Scarani, Valerio [Centre for Quantum Technologies and Department of Physics, National University of Singapore (Singapore)

    2010-07-15T23:59:59.000Z

    We describe a quantum key distribution protocol based on pairs of entangled qubits that generates a secure key between two partners in an environment of unknown and slowly varying reference frame. A direction of particle delivery is required, but the phases between the computational basis states need not be known or fixed. The protocol can simplify the operation of existing setups and has immediate applications to emerging scenarios such as earth-to-satellite links and the use of integrated photonic waveguides. We compute the asymptotic secret key rate for a two-qubit source, which coincides with the rate of the six-state protocol for white noise. We give the generalization of the protocol to higher-dimensional systems and detail a scheme for physical implementation in the three-dimensional qutrit case.

  15. Selected DOE Headquarters publications, October 1979

    SciTech Connect (OSTI)

    None

    1980-07-01T23:59:59.000Z

    This publication provides cumulative listings of and an index to DOE headquarters publications issued since October 1979. Three types of headquarters publications are included: publications dealing mainly with program and policy that are attributed to and issued by headquarters organizations, reports prepared by contractors to describe research and development work they have performed for the Department, and environmental development plans and impact statements. Such items as pamphlets, fact sheets, bulletins, newsletters, telephone directories, headquarters publications issued under the DOE-tr and CONF codes, technical reports from the Jet Propulsion Laboratory and NASA issued under DOE/JPL and DOE/NASA codes, and weekly/monthly reports of the Energy Information Administration are not included. (RWR)

  16. Key Renewable Energy Opportunities for Oklahoma Tribes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey IssuesKEY

  17. EE Regional Technology Roadmap Includes comparison

    E-Print Network [OSTI]

    EE Regional Technology Roadmap Includes comparison against 6th Power Plan (Update cyclically Data Clearinghouse BPA/RTF NEEA/Regional Programs Group Update Regional EE Technology Roadmap Lighting

  18. DIDACTICAL HOLOGRAPHIC EXHIBIT INCLUDING (HOLOGRAPHIC TELEVISION)

    E-Print Network [OSTI]

    de Aguiar, Marcus A. M.

    DIDACTICAL HOLOGRAPHIC EXHIBIT INCLUDING HoloTV (HOLOGRAPHIC TELEVISION) José J. Lunazzi , DanielCampinasSPBrasil Abstract: Our Institute of Physics exposes since 1980 didactical exhibitions of holography in Brazil where

  19. Sessions include: Beginning Farmer and Rancher

    E-Print Network [OSTI]

    Watson, Craig A.

    Sessions include: ­ Beginning Farmer and Rancher ­ New Markets and Regulations ­ Food Safety ­ Good Bug, Bad Bug ID ­ Horticulture ­ Hydroponics ­ Livestock and Pastured Poultry ­ Mushrooms ­ Organic ­ Live animal exhibits ­ Saturday evening social, and ­ Local foods Florida Small Farms and Alternative

  20. Gas storage materials, including hydrogen storage materials

    DOE Patents [OSTI]

    Mohtadi, Rana F; Wicks, George G; Heung, Leung K; Nakamura, Kenji

    2014-11-25T23:59:59.000Z

    A material for the storage and release of gases comprises a plurality of hollow elements, each hollow element comprising a porous wall enclosing an interior cavity, the interior cavity including structures of a solid-state storage material. In particular examples, the storage material is a hydrogen storage material, such as a solid state hydride. An improved method for forming such materials includes the solution diffusion of a storage material solution through a porous wall of a hollow element into an interior cavity.

  1. Gas storage materials, including hydrogen storage materials

    DOE Patents [OSTI]

    Mohtadi, Rana F; Wicks, George G; Heung, Leung K; Nakamura, Kenji

    2013-02-19T23:59:59.000Z

    A material for the storage and release of gases comprises a plurality of hollow elements, each hollow element comprising a porous wall enclosing an interior cavity, the interior cavity including structures of a solid-state storage material. In particular examples, the storage material is a hydrogen storage material such as a solid state hydride. An improved method for forming such materials includes the solution diffusion of a storage material solution through a porous wall of a hollow element into an interior cavity.

  2. Norwich Public Utilities (Electric)- Residential Energy Efficiency Rebate Program

    Broader source: Energy.gov [DOE]

    Norwich Public Utilities (NPU) provides residential customers with rebates on the ENERGY STAR-qualified appliances and energy efficient HVAC equipment. Eligible appliance purchases include...

  3. Fleet DNA Project - Data Dictionary for Public Download Files

    SciTech Connect (OSTI)

    Duran, A.; Burton, E.; Kelly, K.; Walkowicz, K.

    2014-09-01T23:59:59.000Z

    Reference document for the Fleet DNA results data shared on the NREL public website. The document includes variable definitions and descriptions to assist users in understanding data.

  4. Regulated Public Environments: The New Geography of US Urban Poverty

    E-Print Network [OSTI]

    Rongerude, Jane

    2006-01-01T23:59:59.000Z

    New Landscapes of Poverty Management,” !" #$%&'($)*+The New Geography of US Urban Poverty residents, boards, andthrough the project of poverty management. “Publicincludes

  5. Third Party Financing and Power Purchasing Agreements for Public...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Power Purchase Agreements for public sector PV projects presented at the TAP Web Seminar on May 27, 2009, includes economic and legal information. Third Party Financing...

  6. Microsoft Word - Number of Public Involvement Deliverables _2...

    National Nuclear Security Administration (NNSA)

    numerous (+150) video clips and raw video * Maintain the Public Involvement portion of web-based Environmental Management Information System (includes uploading briefings,...

  7. Publications List Publication Title ISSN ISBN

    E-Print Network [OSTI]

    Hoffmann, Rolf

    -7803-4881-8 3-D Digital Imaging and Modeling, 1997. Proceedings., International Conference on 0-8186-7943-3 3-D Digital Imaging and Modeling, 1999. Proceedings. Second International Confer 0-7695-0062-5 3-D ImagingPublications List Publication Title ISSN ISBN 100 Years of Radio, 1995., International Conference

  8. 2 Key Achievements 7 Greenhouse Gas Reduction

    E-Print Network [OSTI]

    Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

  9. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

    2012-01-01T23:59:59.000Z

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  10. CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

  11. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  12. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

  13. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology · Despite the focus here on global issues, we need to recognize that Mongolia

  14. Key facts about Argonne National Laboratory

    E-Print Network [OSTI]

    Kemner, Ken

    Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

  15. US Department of Energy environmental management advisory board public meeting

    SciTech Connect (OSTI)

    Not Available

    1994-03-01T23:59:59.000Z

    Contents of this publication include: list of participants; March 14, 1994--opening of public meeting and subcommittee reports, and public comment session; March 15, 1994--presentation by Thomas P. Grumbly, assistant secretary for environmental management, presentations by senior environmental management officials, and committee business.

  16. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Calgary, University of

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys/Graduate Student Study space that has been assigned. Keys Any keys issued to me from the Department of Chemical

  17. The New House of the Region of Hannover - Building Energy Efficient in a Public Private Partnership

    E-Print Network [OSTI]

    Schubert, T.; Plesser, S.

    2008-01-01T23:59:59.000Z

    / 3 91 - 35 84 plesser@igs.bau.tu-bs.de The New House of the Region of Hannover - Building energy Efficient in a Public Private Partnership Topic: Examples of advanced/demonstration buildings Key words: Demonstration building, PPP..., public private partnership, commissioning, energy efficiency, user comfort Public Private Partnerships are an increasingly popular approach to carry out public infra-structure projects. PPPs aim at reducing costs and risk and improving service...

  18. Key results from SB8 simulant flowsheet studies

    SciTech Connect (OSTI)

    Koopman, D. C.

    2013-04-26T23:59:59.000Z

    Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

  19. Review of Public Safety in Viewpoint of Complex Networks

    SciTech Connect (OSTI)

    Gai Chengcheng; Weng Wenguo; Yuan Hongyong [Center for Public Safety Research, Tsinghua university, Department of Engineering Physics, Tsinghua university (China)

    2010-05-21T23:59:59.000Z

    In this paper, a brief review of public safety in viewpoint of complex networks is presented. Public safety incidents are divided into four categories: natural disasters, industry accidents, public health and social security, in which the complex network approaches and theories are need. We review how the complex network methods was developed and used in the studies of the three kinds of public safety incidents. The typical public safety incidents studied by the complex network methods in this paper are introduced, including the natural disaster chains, blackouts on electric power grids and epidemic spreading. Finally, we look ahead to the application prospects of the complex network theory on public safety.

  20. Local Public Finance

    E-Print Network [OSTI]

    Quigley, John M.

    2008-01-01T23:59:59.000Z

    1959. The Theory of Public Finance. New York: McGraw-Hill.T. 2003. School finance, spatial income segregation, and theJohn M. "local public finance." The New Palgrave Dictionary

  1. Local Public Finance

    E-Print Network [OSTI]

    Quigley, John M.

    2008-01-01T23:59:59.000Z

    24. How to cite this article Quigley, John M. "local publicEW P ALGRAVE ) By John M. Quigley May 2008 These papers arelocal public finance John M. Quigley From The New Palgrave

  2. Local Public Finance

    E-Print Network [OSTI]

    Quigley, John M.

    2008-01-01T23:59:59.000Z

    cite this article Quigley, John M. "local public finance."HE N EW P ALGRAVE ) By John M. Quigley May 2008 These paperslocal public finance John M. Quigley From The New Palgrave

  3. Mississippi Public Utility Act

    Broader source: Energy.gov [DOE]

    The Mississippi Public Utility Act is relevant to any project that plans to generate energy. It requires that a utility must first obtain a Certificate of Public Convenience and Necessity (CPCN)...

  4. Community Health & Public Health

    E-Print Network [OSTI]

    Jiang, Huiqiang

    Community Health & Public Health Preparedness in the Marcellus Shale Era 2011 Pennsylvania Public Photo credit: Pittsburgh Tribune- Review, Keith Hodan #12;Safety by the Numbers PA Marcellus Citations. Conference presentation, Spain. · County Commissioners Association of Pennsylvania (CCAP). (2010). Marcellus

  5. Communication in automation, including networking and wireless

    E-Print Network [OSTI]

    Antsaklis, Panos

    Communication in automation, including networking and wireless Nicholas Kottenstette and Panos J and networking in automation is given. Digital communication fundamentals are reviewed and networked control are presented. 1 Introduction 1.1 Why communication is necessary in automated systems Automated systems use

  6. Electrochemical cell including ribbed electrode substrates

    SciTech Connect (OSTI)

    Breault, R.D.; Goller, G.J.; Roethlein, R.J.; Sprecher, G.C.

    1981-07-21T23:59:59.000Z

    An electrochemical cell including an electrolyte retaining matrix layer located between and in contact with cooperating anode and cathode electrodes is disclosed herein. Each of the electrodes is comprised of a ribbed (or grooved) substrate including a gas porous body as its main component and a catalyst layer located between the substrate and one side of the electrolyte retaining matrix layer. Each substrate body includes a ribbed section for receiving reactant gas and lengthwise side portions on opposite sides of the ribbed section. Each of the side portions includes a channel extending along its entire length from one surface thereof (e.g., its outer surface) to but stopping short of an opposite surface (e.g., its inner surface) so as to provide a web directly between the channel and the opposite surface. Each of the channels is filled with a gas impervious substance and each of the webs is impregnated with a gas impervious substance so as to provide a gas impervious seal along the entire length of each side portion of each substrate and between the opposite faces thereof (e.g., across the entire thickness thereof).

  7. Prices include compostable serviceware and linen tablecloths

    E-Print Network [OSTI]

    California at Davis, University of

    & BLACK BEAN ENCHILADAS Fresh corn tortillas stuffed with tender brown butter sautéed butternut squash, black beans and yellow on- ions, garnished with avocado and sour cream. $33 per person EDAMAME & CORN SQUASH & BLACK BEAN ENCHILADA FREE RANGE CHICK- EN SANDWICH PLATED ENTREES All plated entrees include

  8. Energy Consumption of Personal Computing Including Portable

    E-Print Network [OSTI]

    Namboodiri, Vinod

    Energy Consumption of Personal Computing Including Portable Communication Devices Pavel Somavat1 consumption, questions are being asked about the energy contribution of computing equipment. Al- though studies have documented the share of energy consumption by this type of equipment over the years, research

  9. Indianapolis Public Transportation Corporation

    SciTech Connect (OSTI)

    Not Available

    2004-12-01T23:59:59.000Z

    Fact sheet describes the National Renewable Energy Laboratory's evaluation of Indianapolis Public Transportation Corporation's (IndyGo's) hybrid electric buses.

  10. Classification Documents and Publications

    Broader source: Energy.gov [DOE]

    Certain documents and publications created or issued by the Office of Classification are available from this page.

  11. TRINITY HALL PUBLICATION SCHEME

    E-Print Network [OSTI]

    Lasenby, Joan

    TRINITY HALL PUBLICATION SCHEME PART 1 INTRODUCTION 1. Legal requirement 1.1 Adopting a publication and whether or not charges will be made. 3. The `model' publication scheme for higher education 3.1 Trinity and is committed to publishing the information it describes. 4. Who we are 4.1 Trinity Hall is a college within

  12. Rodrigo Bańuelos: Publications.html

    E-Print Network [OSTI]

    MathScinet Publications and other (September 2013) · Link to Publications on MathScinet. RECENT PUBLICATIONS To Appear/In press: Bańuelos, Rodrigo ...

  13. Reactor & Nuclear Systems Publications | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science Home | Science & Discovery | Nuclear Science | Publications and Reports | Reactor and Nuclear Systems Publications SHARE Reactor and Nuclear Systems Publications The...

  14. Three key elements necessary for successful testing

    SciTech Connect (OSTI)

    Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

    1994-07-25T23:59:59.000Z

    Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

  15. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21T23:59:59.000Z

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  16. Subterranean barriers including at least one weld

    DOE Patents [OSTI]

    Nickelson, Reva A.; Sloan, Paul A.; Richardson, John G.; Walsh, Stephanie; Kostelnik, Kevin M.

    2007-01-09T23:59:59.000Z

    A subterranean barrier and method for forming same are disclosed, the barrier including a plurality of casing strings wherein at least one casing string of the plurality of casing strings may be affixed to at least another adjacent casing string of the plurality of casing strings through at least one weld, at least one adhesive joint, or both. A method and system for nondestructively inspecting a subterranean barrier is disclosed. For instance, a radiographic signal may be emitted from within a casing string toward an adjacent casing string and the radiographic signal may be detected from within the adjacent casing string. A method of repairing a barrier including removing at least a portion of a casing string and welding a repair element within the casing string is disclosed. A method of selectively heating at least one casing string forming at least a portion of a subterranean barrier is disclosed.

  17. Public Key Encryption Which is Simultaneously a Locally-Decodable Error-Correcting Code

    E-Print Network [OSTI]

    that homomorphic encryption implies PIR, we give a general reduction from any semantically-secure homomorphic, this is a protocol that is semantically-secure in the standard sense, but possesses the additional property|) number of bits of the corrupted ciphertext and performing computation polynomial in the security

  18. ShortPK: A Short-Term Public Key Scheme for Broadcast Authentication in Sensor Networks

    E-Print Network [OSTI]

    Du, Wenliang "Kevin"

    on energy consumption. Categories and Subject Descriptors: C.2.1 [Computer-Communication Networks]: Network Engineering Building II, North Carolina State University, Raleigh, NC 27695; email: pning Wang, Wenliang Du, Xiaogang Liu Syracuse University and Peng Ning North Carolina State University

  19. How Practical is Public-Key Encryption Based on LPN and Ring-LPN?

    E-Print Network [OSTI]

    on the Blum-Kalai-Wasserman (BKW) algo- rithm [BKW03]. The original BKW algorithm was estimated to have

  20. Power generation method including membrane separation

    DOE Patents [OSTI]

    Lokhandwala, Kaaeid A. (Union City, CA)

    2000-01-01T23:59:59.000Z

    A method for generating electric power, such as at, or close to, natural gas fields. The method includes conditioning natural gas containing C.sub.3+ hydrocarbons and/or acid gas by means of a membrane separation step. This step creates a leaner, sweeter, drier gas, which is then used as combustion fuel to run a turbine, which is in turn used for power generation.

  1. Rotor assembly including superconducting magnetic coil

    DOE Patents [OSTI]

    Snitchler, Gregory L. (Shrewsbury, MA); Gamble, Bruce B. (Wellesley, MA); Voccio, John P. (Somerville, MA)

    2003-01-01T23:59:59.000Z

    Superconducting coils and methods of manufacture include a superconductor tape wound concentrically about and disposed along an axis of the coil to define an opening having a dimension which gradually decreases, in the direction along the axis, from a first end to a second end of the coil. Each turn of the superconductor tape has a broad surface maintained substantially parallel to the axis of the coil.

  2. Electric power monthly, September 1990. [Glossary included

    SciTech Connect (OSTI)

    Not Available

    1990-12-17T23:59:59.000Z

    The purpose of this report is to provide energy decision makers with accurate and timely information that may be used in forming various perspectives on electric issues. The power plants considered include coal, petroleum, natural gas, hydroelectric, and nuclear power plants. Data are presented for power generation, fuel consumption, fuel receipts and cost, sales of electricity, and unusual occurrences at power plants. Data are compared at the national, Census division, and state levels. 4 figs., 52 tabs. (CK)

  3. Building America Expert Meeting: Key Innovations for Adding Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects This...

  4. authenticated key exchange: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 56 Authentication and Key Agreement via Memorable...

  5. analysis material key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

  6. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Environmental Management (EM)

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  7. Midstream Infrastructure Improvements Key to Realizing Full Potential...

    Office of Environmental Management (EM)

    Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

  8. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    SciTech Connect (OSTI)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01T23:59:59.000Z

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  9. QER Public Meeting: Petroleum Product Transmission & Distribution

    Broader source: Energy.gov [DOE]

    May 27, 2014 Public Meeting: Petroleum Product Transmission & Distribution (including CO2/EOR) On May 27, 2014, the DOE will hold a public meeting in New Orleans, Louisiana. The May 27, 2014 public meeting will feature facilitated panel discussions, followed by an open microphone session. Persons desiring to speak during the 6 open microphone session at the public meeting should come prepared to speak for no more than 3 minutes and will be accommodated on a first- come, first- serve basis, according to the order in which they register to speak on a sign-in sheet available at the meeting location, on the morning of the meeting. In advance of the meeting, DOE anticipates making publicly available a briefing memorandum providing useful background information regarding the topics under discussion at the meeting. DOE will post this memorandum on its website: http://energy.gov

  10. Handbook of Public Information Systems Handbook of Public Information Systems

    E-Print Network [OSTI]

    IT and public administration, drawing on both the rising interest in the new public management (NPM) and new

  11. From Public Housing to Regulated Public Environments: The Redevelopment of San Francisco’s Public Housing

    E-Print Network [OSTI]

    Rongerude, Jane

    2007-01-01T23:59:59.000Z

    Gentrification, Public Housing and the Limits of Newof Families in Public Housing. Dissertation. University ofJeff. 2003. “The End of Public Housing as We Know It. ” The

  12. Quantum key distribution over 25 km with an all-fiber continuous-variable system

    E-Print Network [OSTI]

    Jerome Lodewyck; Matthieu Bloch; Raul Garcia-Patron; Simon Fossier; Evgueni Karpov; Eleni Diamanti; Thierry Debuisschert; Nicolas J. Cerf; Rosa Tualle-Brouri; Steven W. McLaughlin; Philippe Grangier

    2007-09-04T23:59:59.000Z

    We report on the implementation of a reverse-reconciliated coherent-state continuous-variable quantum key distribution system, with which we generated secret keys at a rate of more than 2 kb/s over 25 km of optical fiber. Time multiplexing is used to transmit both the signal and phase reference in the same optical fiber. Our system includes all experimental aspects required for a field implementation of a quantum key distribution setup. Real-time reverse reconciliation is achieved by using fast and efficient LDPC error correcting codes.

  13. Quantum key distribution over 25 km with an all-fiber continuous-variable system

    SciTech Connect (OSTI)

    Lodewyck, Jerome; Fossier, Simon [Thales Research and Technologies, RD 128, 91767 Palaiseau Cedex (France); Laboratoire Charles Fabry de l'Institut d'Optique-CNRS-Universite Paris-Sud, Campus Polytechnique, RD 128, 91127 Palaiseau Cedex (France); Bloch, Matthieu; McLaughlin, Steven W. [GeorgiaTech-CNRS UMI 2958, 2-3 rue Marconi, 57070 Metz (France); Garcia-Patron, Raul; Karpov, Evgueni; Cerf, Nicolas J. [Centre for Quantum Information and Communication, Ecole Polytechnique, CP 165/59, Universite libre de Bruxelles, 50 av. F. D. Roosevelt, B-1050 Brussels (Belgium); Diamanti, Eleni; Tualle-Brouri, Rosa; Grangier, Philippe [Laboratoire Charles Fabry de l'Institut d'Optique-CNRS-Universite Paris-Sud, Campus Polytechnique, RD 128, 91127 Palaiseau Cedex (France); Debuisschert, Thierry [Thales Research and Technologies, RD 128, 91767 Palaiseau Cedex (France)

    2007-10-15T23:59:59.000Z

    We report on the implementation of a reverse-reconciliated coherent-state continuous-variable quantum key distribution system, with which we generated secret keys at a rate of more than 2 kb/s over 25 km of optical fiber. Time multiplexing is used to transmit both the signal and phase reference in the same optical fiber. Our system includes all experimental aspects required for a field implementation of a quantum key distribution setup. Real-time reverse reconciliation is achieved by using fast and efficient low-density parity check error correcting codes.

  14. Quantum key distribution using entangled-photon trains with no basis selection

    SciTech Connect (OSTI)

    Inoue, Kyo [Osaka University, Osaka 565-0871 (Japan); NTT Basic Research Laboratories, NTT Corporation, Kanagawa 243-0198 (Japan); CREST, JST, Saitama 332-0012 (Japan); Takesue, Hiroki [NTT Basic Research Laboratories, NTT Corporation, Kanagawa 243-0198 (Japan); CREST, JST, Saitama 332-0012 (Japan)

    2006-03-15T23:59:59.000Z

    Conventional quantum key distribution (QKD) protocols include a basis selection process for providing a secure secret key. In contrast, this paper proposes an entanglement-based QKD with no basis selection procedure. Entangled-photon pulse trains with an average photon number less than one per pulse are sent to two legitimate parties, from which a secret key is created utilizing the entanglement nature. Eavesdropping on a transmission line is prevented by a condition of less than one photon per pulse, and sending classically correlated coherent pulses instead of quantum correlated ones is revealed by monitoring coincident count rate000.

  15. Multiverse rate equation including bubble collisions

    E-Print Network [OSTI]

    Michael P. Salem

    2013-02-19T23:59:59.000Z

    The volume fractions of vacua in an eternally inflating multiverse are described by a coarse-grain rate equation, which accounts for volume expansion and vacuum transitions via bubble formation. We generalize the rate equation to account for bubble collisions, including the possibility of classical transitions. Classical transitions can modify the details of the hierarchical structure among the volume fractions, with potential implications for the staggering and Boltzmann-brain issues. Whether or not our vacuum is likely to have been established by a classical transition depends on the detailed relationships among transition rates in the landscape.

  16. Upper bound on the secret key rate distillable from effective quantum correlations with imperfect detectors

    SciTech Connect (OSTI)

    Moroder, Tobias; Curty, Marcos; Luetkenhaus, Norbert [Quantum Information Theory Group, Institut fuer Theoretische Physik I, and Max-Planck Research Group, Institute of Optics, Information and Photonics, Universitaet Erlangen-Nuernberg, Staudtstrasse 7/B2, 91058 Erlangen (Germany)

    2006-01-15T23:59:59.000Z

    We provide a simple method to obtain an upper bound on the secret key rate that is particularly suited to analyze practical realizations of quantum key distribution protocols with imperfect devices. We consider the so-called trusted device scenario where Eve cannot modify the actual detection devices employed by Alice and Bob. The upper bound obtained is based on the available measurements results, but it includes the effect of the noise and losses present in the detectors of the legitimate users.

  17. Min-entropy and quantum key distribution: Nonzero key rates for ''small'' numbers of signals

    SciTech Connect (OSTI)

    Bratzik, Sylvia; Mertz, Markus; Kampermann, Hermann; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-02-15T23:59:59.000Z

    We calculate an achievable secret key rate for quantum key distribution with a finite number of signals by evaluating the quantum conditional min-entropy explicitly. The min-entropy for a classical random variable is the negative logarithm of the maximal value in its probability distribution. The quantum conditional min-entropy can be expressed in terms of the guessing probability, which we calculate for d-dimensional systems. We compare these key rates to previous approaches using the von Neumann entropy and find nonzero key rates for a smaller number of signals. Furthermore, we improve the secret key rates by modifying the parameter estimation step. Both improvements taken together lead to nonzero key rates for only 10{sup 4}-10{sup 5} signals. An interesting conclusion can also be drawn from the additivity of the min-entropy and its relation to the guessing probability: for a set of symmetric tensor product states, the optimal minimum-error discrimination (MED) measurement is the optimal MED measurement on each subsystem.

  18. New Models of Public Ownership in Energy

    E-Print Network [OSTI]

    Haney, Aoife Brophy; Pollitt, Michael G.

    These included rural electric cooperatives in the US or customer owned utilities in Denmark. Nowadays, as we shall demonstrate, public involvement in ownership (in the sense of residual control rights, following Hart and Moore, 1990) takes many different... history of public ownership of the power sector in many countries was driven by the perceived inability of the private market to finance the large investment requirements of the sector during the electrification period (Millward, 2010). Third...

  19. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

    2007-03-14T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

  20. STGWG Key Outcomes for May 3, 2010

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  1. STGWG Key Outcomes for October 21, 2009

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  2. Optical panel system including stackable waveguides

    DOE Patents [OSTI]

    DeSanto, Leonard (Dunkirk, MD); Veligdan, James T. (Manorville, NY)

    2007-11-20T23:59:59.000Z

    An optical panel system including stackable waveguides is provided. The optical panel system displays a projected light image and comprises a plurality of planar optical waveguides in a stacked state. The optical panel system further comprises a support system that aligns and supports the waveguides in the stacked state. In one embodiment, the support system comprises at least one rod, wherein each waveguide contains at least one hole, and wherein each rod is positioned through a corresponding hole in each waveguide. In another embodiment, the support system comprises at least two opposing edge structures having the waveguides positioned therebetween, wherein each opposing edge structure contains a mating surface, wherein opposite edges of each waveguide contain mating surfaces which are complementary to the mating surfaces of the opposing edge structures, and wherein each mating surface of the opposing edge structures engages a corresponding complementary mating surface of the opposite edges of each waveguide.

  3. Optical panel system including stackable waveguides

    DOE Patents [OSTI]

    DeSanto, Leonard; Veligdan, James T.

    2007-03-06T23:59:59.000Z

    An optical panel system including stackable waveguides is provided. The optical panel system displays a projected light image and comprises a plurality of planar optical waveguides in a stacked state. The optical panel system further comprises a support system that aligns and supports the waveguides in the stacked state. In one embodiment, the support system comprises at least one rod, wherein each waveguide contains at least one hole, and wherein each rod is positioned through a corresponding hole in each waveguide. In another embodiment, the support system comprises at least two opposing edge structures having the waveguides positioned therebetween, wherein each opposing edge structure contains a mating surface, wherein opposite edges of each waveguide contain mating surfaces which are complementary to the mating surfaces of the opposing edge structures, and wherein each mating surface of the opposing edge structures engages a corresponding complementary mating surface of the opposite edges of each waveguide.

  4. Thermovoltaic semiconductor device including a plasma filter

    DOE Patents [OSTI]

    Baldasaro, Paul F. (Clifton Park, NY)

    1999-01-01T23:59:59.000Z

    A thermovoltaic energy conversion device and related method for converting thermal energy into an electrical potential. An interference filter is provided on a semiconductor thermovoltaic cell to pre-filter black body radiation. The semiconductor thermovoltaic cell includes a P/N junction supported on a substrate which converts incident thermal energy below the semiconductor junction band gap into electrical potential. The semiconductor substrate is doped to provide a plasma filter which reflects back energy having a wavelength which is above the band gap and which is ineffectively filtered by the interference filter, through the P/N junction to the source of radiation thereby avoiding parasitic absorption of the unusable portion of the thermal radiation energy.

  5. Key Predistribution Techniques for Grid-Based Wireless Sensor Networks

    E-Print Network [OSTI]

    Key Predistribution Techniques for Grid-Based Wireless Sensor Networks Simon R. Blackburn1 , Tuvi sensor networks. Networks consisting of wireless sensor nodes ar- ranged in a grid pattern have many for the instantiation of these schemes. Key words: Key predistribution, wireless sensor networks; symmetric key

  6. NREL: Technology Deployment - Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Technical Assistance: The DOENREL Approach NREL Helps Greensburg Set the Model for Green Communities Renewable Energy Community: Key Elements Federal Agencies Department of...

  7. Sandia Energy - EC Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Integrated Nanotechnologies (106) CINT User Conference and SSLS EFRC Workshop (38) ECIS SMU Key Facilities 2011 (427) Energy, Climate, & Infrastructure Security Executive Summary...

  8. Sandia Energy - EC Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for Utility Operations (63) Distributed Energy Technology Laboratory (DETL) (266) ECIS SMU Key Facilities 2011 (427) Energy, Climate, & Infrastructure Security Executive Summary...

  9. Sandia Energy - EC Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Solar Resource (159) CALIBRATION OF PHOTOVOLTAIC MODULE PERFORMANCE MODELS (11) ECIS SMU Key Facilities 2011 (427) Energy, Climate, & Infrastructure Security Executive Summary...

  10. Selected DOE Headquarters publications October 1979-March 1980

    SciTech Connect (OSTI)

    None

    1980-03-01T23:59:59.000Z

    Selected DOE Headquarters Publications provides cumulative listings of and an index to DOE headquarters publications issued since October 1979. (Publications issued during October 1977-September 1979 are covered in DOE/AD-0010/6.) Three types of headquarters publications are included: publications dealing mainly with program and policy that are attributed to and issued by headquarters organizations, reports prepared by contractors (and published by DOE) to describe research and development work they have performed for the Department under 01-type (Headquarters) contracts, and environmental development plans and impact statements. Certain publications are omitted. They include such items as pamphlets, fact sheets, bulletins, newsletters, telephone directories, headquarters publications issued under the DOE-tr and CONF codes, technical reports from the Jet Propulsion Laboratory and NASA issued under DOE/JPL/ and DOE/NASA codes, and weekly/monthly reports of the Energy Information Administration. (RWR)

  11. Selected DOE Headquarters publications, October 1979-January 1980

    SciTech Connect (OSTI)

    None

    1980-01-01T23:59:59.000Z

    Beginning with this issue (DOE/AD-0010/7), this publication provides cumulative listings of and an index to DOE headquarters publications issued since October 1979. (Publications issued during October 1977-September 1979 are covered in DOE/AD-0010/6). Three types of headquarters publications are included: publications dealing mainly with program and policy that are attributed to and issued by headquarters organizations, reports prepared by contractors to describe research and development work they have performed for the Department, and environmental development plans and impact statements. Certain publications have been omitted. They include such items as pamphlets, fact sheets, bulletins, newsletters, telephone directories, publications issued under the DOE/tr, CONF, DOE/JPL, and DOE/NASA codes, and weekly/monthly reports of the Energy Information Administration. (RWR)

  12. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

    2007-01-01T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

  13. Engine lubrication circuit including two pumps

    DOE Patents [OSTI]

    Lane, William H.

    2006-10-03T23:59:59.000Z

    A lubrication pump coupled to the engine is sized such that the it can supply the engine with a predetermined flow volume as soon as the engine reaches a peak torque engine speed. In engines that operate predominately at speeds above the peak torque engine speed, the lubrication pump is often producing lubrication fluid in excess of the predetermined flow volume that is bypassed back to a lubrication fluid source. This arguably results in wasted power. In order to more efficiently lubricate an engine, a lubrication circuit includes a lubrication pump and a variable delivery pump. The lubrication pump is operably coupled to the engine, and the variable delivery pump is in communication with a pump output controller that is operable to vary a lubrication fluid output from the variable delivery pump as a function of at least one of engine speed and lubrication flow volume or system pressure. Thus, the lubrication pump can be sized to produce the predetermined flow volume at a speed range at which the engine predominately operates while the variable delivery pump can supplement lubrication fluid delivery from the lubrication pump at engine speeds below the predominant engine speed range.

  14. Models of Procyon A including seismic constraints

    E-Print Network [OSTI]

    P. Eggenberger; F. Carrier; F. Bouchy

    2005-01-14T23:59:59.000Z

    Detailed models of Procyon A based on new asteroseismic measurements by Eggenberger et al (2004) have been computed using the Geneva evolution code including shellular rotation and atomic diffusion. By combining all non-asteroseismic observables now available for Procyon A with these seismological data, we find that the observed mean large spacing of 55.5 +- 0.5 uHz favours a mass of 1.497 M_sol for Procyon A. We also determine the following global parameters of Procyon A: an age of t=1.72 +- 0.30 Gyr, an initial helium mass fraction Y_i=0.290 +- 0.010, a nearly solar initial metallicity (Z/X)_i=0.0234 +- 0.0015 and a mixing-length parameter alpha=1.75 +- 0.40. Moreover, we show that the effects of rotation on the inner structure of the star may be revealed by asteroseismic observations if frequencies can be determined with a high precision. Existing seismological data of Procyon A are unfortunately not accurate enough to really test these differences in the input physics of our models.

  15. Sandia National Laboratories: Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    This public benchmark represents analysis ... A Model for the Nation: Promoting Education and Innovation in Vermont's Electricity Sector On May 8, 2012, in Climate,...

  16. Emergency Public Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-08-21T23:59:59.000Z

    This volume defines elements of providing information to the public during and following emergencies. Canceled by DOE G 151.1-4.

  17. CEES Publications and Presentations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    & Presentations CEES-Authored and Co-Authored Cover Stories Peer-Reviewed Publications Conference Proceedings, Abstracts, Presentations, and Poster Sessions Patents Frontiers in...

  18. Sandia Energy - EC Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    public fears regarding nuclear energy remain and are probably enhances by the effect of the tsunami on the Fukushima reactor, development of nuclear power is likely to continue...

  19. Geothermal Outreach Publications

    Broader source: Energy.gov [DOE]

    Here you'll find the U.S. Department of Energy's (DOE) most recent outreach publications about geothermal technologies, research, and development.

  20. 2001: PUBLICATIONS WITH RESULTS FROM USERS' IRAM OBSERVATIONS

    E-Print Network [OSTI]

    RadioAstronomie Millimétrique, Institut de (IRAM)

    2001: PUBLICATIONS WITH RESULTS FROM USERS' IRAM OBSERVATIONS 829. WARM H2 IN THE GALACTIC CENTER. HĂĽttemeister 2001, A&A 365, 174 830. THE IRAM KEY-PROJECT: SMALL- SCALE STRUCTURE OF PRE-STAR FORMING REGIONS. Heithausen, E. Falgarone 2001, A&A 365, 275 831. METHODS AND CONSTRAINTS FOR THE CORRECTION OF THE ERROR BEAM

  1. Public affairs plan

    SciTech Connect (OSTI)

    NONE

    1995-09-01T23:59:59.000Z

    The purpose of the Uranium Mill Tailings Remedial Action (UMTRA) Project Public Affairs Plan is to establish goals for the fiscal year (FY) 1996 UMTRA Project public affairs program and to identify specific activities to be conducted during the year. It describes the roles of various agencies involved in the public affairs program and defines the functions of the UMTRA Project Technical Assistance Contractor (TAC) Public Affairs Department. It replaces the FY 1995 Public Affairs Plan (DOE/AL/62350-154). The plan also describes the US Department of Energy`s (DOE) plans to keep stakeholders and other members of the public informed about UMTRA Project policies, plans, and activities, and provide opportunities for stakeholders and interested segments of the public to participate in UMTRA Project decision-making processes. The plan applies to the UMTRA Project Team; the DOE Grand Junction Projects Office (GJPO); the DOE Albuquerque Operations Office, Office of Public Affairs (OPA); the TAC; the UMTRA Project Remedial Action Contractor (RAC); and other cooperating agencies.

  2. Public affairs plan

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    The purpose of the Uranium Mill Tailings Remedial Action (UMTRA) Project Public Affairs Plan is to establish goals for the Fiscal Year 1995 UMTRA public affairs program and identify specific activities to be conducted during the year. It also describes the roles of various agencies involved in the conduct of the public affairs program and defines the functions of the Technical Assistance Contractor (TAC) Public Affairs Department. It integrates and replaces the Public Participation Plan (DOE/AL/62350-47D) and Public Information Plan (DOE/AL/623590-71). The plan describes the US Department of Energy`s (DOE) plans to keep stakeholders and other members of the public informed about project policies, plans, and activities, and provide opportunities for stakeholders and interested segments of the public to participate in project decision-making processes. The plan applies to the UMTRA Project Office; the DOE Albuquerque Operations Office, Office of Intergovernmental and External Affairs (OIEA); the UMTRA TAC; the UMTRA Remedial Action Contractor (RAC); and other cooperating agencies.

  3. Publications of Los Alamos research, 1977-1981

    SciTech Connect (OSTI)

    Sheridan, C.J.; Garcia, C.A. (comps.)

    1983-03-01T23:59:59.000Z

    This bibliography is a compilation of unclassified publications of work done at the Los Alamos National Laboratory for 1977-1981. Papers published in those years are included regardless of when they were actually written. Publications received too late for inclusion in earlier compilations have also been listed. Declassification of previously classified reports is considered to constitute publication. All classified issuances are omitted - even those papers, themselves unclassified, which were published only as part of a classified document. If a paper was published more than once, all places of publication are included. The bibliography includes Los Alamos National Laboratory reports, papers released as non-Laboratory reports, journal articles, books, chapters of books, conference papers either published separately or as part of conference proceedings issued as books or reports, papers published in congressional hearings, theses, and US patents. Publications by Los Alamos authors that are not records of Laboratory-sponsored work are included when the Library becomes aware of them.

  4. Public engagement on solar radiation management and why it needs to happen now

    E-Print Network [OSTI]

    Yung, Laurie

    Public engagement on solar radiation management and why it needs to happen now Wylie A. Carr, and governance of one branch of geoengineering, solar radiation management (SRM), in three key ways: 1;1 The context for public engagement in solar radiation management Solar radiation management (SRM) has recently

  5. PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES Programme name Public Health (Health Visiting, School Nursing or District

    E-Print Network [OSTI]

    Weyde, Tillman

    in public health policy making and practice development in relation to the management and delivery1 PROGRAMME SPECIFICATION ­ POSTGRADUATE PROGRAMMES KEY FACTS Programme name Public Health (Health of the Health Visitor, School Nurse or District Nurse in the new NHS is changing in response to the health

  6. Prevention of Harassment (Including Sexual Harassment) and Retaliation...

    Broader source: Energy.gov (indexed) [DOE]

    Policy July 2011.pdf More Documents & Publications Policy Statement on Equal Employment Opportunity, Harassment and Retaliation Policy Statement on Equal Employment...

  7. Social Impact Management Plans: Innovation in corporate and public policy

    SciTech Connect (OSTI)

    Franks, Daniel M., E-mail: d.franks@uq.edu.au [Centre for Social Responsibility in Mining, The University of Queensland, Sustainable Minerals Institute, St Lucia, Brisbane, Queensland 4072 (Australia); Vanclay, Frank, E-mail: frank.vanclay@rug.nl [Department of Cultural Geography, Faculty of Spatial Sciences, The University of Groningen, P.O. Box 800, 9700 AV Groningen (Netherlands)] [Department of Cultural Geography, Faculty of Spatial Sciences, The University of Groningen, P.O. Box 800, 9700 AV Groningen (Netherlands)

    2013-11-15T23:59:59.000Z

    Social Impact Assessment (SIA) has traditionally been practiced as a predictive study for the regulatory approval of major projects, however, in recent years the drivers and domain of focus for SIA have shifted. This paper details the emergence of Social Impact Management Plans (SIMPs) and undertakes an analysis of innovations in corporate and public policy that have put in place ongoing processes – assessment, management and monitoring – to better identify the nature and scope of the social impacts that might occur during implementation and to proactively respond to change across the lifecycle of developments. Four leading practice examples are analyzed. The International Finance Corporation (IFC) Performance Standards require the preparation of Environmental and Social Management Plans for all projects financed by the IFC identified as having significant environmental and social risks. Anglo American, a major resources company, has introduced a Socio-Economic Assessment Toolbox, which requires mine sites to undertake regular assessments and link these assessments with their internal management systems, monitoring activities and a Social Management Plan. In South Africa, Social and Labour Plans are submitted with an application for a mining or production right. In Queensland, Australia, Social Impact Management Plans were developed as part of an Environmental Impact Statement, which included assessment of social impacts. Collectively these initiatives, and others, are a practical realization of theoretical conceptions of SIA that include management and monitoring as core components of SIA. The paper concludes with an analysis of the implications for the practice of impact assessment including a summary of key criteria for the design and implementation of effective SIMPs. -- Highlights: • Social impact management plans are effective strategies to manage social issues. • They are developed in partnership with regulatory agencies, investors and community. • SIMPs link assessment to ongoing management and address social and community issues. • SIMPs clarify responsibilities in the management of impacts, opportunities and risks. • SIMPs demonstrate a shift to include management as a core component of SIA practice.

  8. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  9. "Turn-Key" Open Source Software Solutions for Energy Management...

    Energy Savers [EERE]

    "Turn-Key" Open Source Software Solutions for Energy Management of Small to Medium Sized Buildings (DE-FOA-0000822) "Turn-Key" Open Source Software Solutions for Energy Management...

  10. Quantum Key Distribution by Utilizing Four-Level Particles

    E-Print Network [OSTI]

    Tao Yan; Fengli Yan

    2010-02-09T23:59:59.000Z

    We present a quantum key distribution protocol based on four-level particles entanglement. Furthermore, a controlled quantum key distribution protocol is proposed by utilizing three four-level particles. We show that the two protocols are secure.

  11. The impacts of urbanization on endangered florida key deer

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12T23:59:59.000Z

    for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

  12. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01T23:59:59.000Z

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  13. actual key success: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  14. access technologies key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  15. Turn Your Key, Be Idle Free | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free April 13, 2010 - 7:30am Addthis Shannon Brescher Shea Communications Manager, Clean Cities Program What activity wastes...

  16. Low-density random matrices for secret key extraction

    E-Print Network [OSTI]

    Zhou, Hongchao

    Secret key extraction, the task of extracting a secret key from shared information that is partially known by an eavesdropper, has important applications in cryptography. Motivated by the requirements of high-speed quantum ...

  17. Secret key agreement using asymmetry in channel state knowledge

    E-Print Network [OSTI]

    Wornell, Gregory W.

    We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The secret-key capacity is established when the wiretap channel is discrete and memoryless, the sender and receiver are both ...

  18. Compression station key to Texas pipeline project

    SciTech Connect (OSTI)

    NONE

    1996-10-01T23:59:59.000Z

    This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

  19. Sandia Energy - EC Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Camacho-Lopez2015-04-06T22:15:34+00:00 Order by: Title Date added Download count ECIS SMU Key Facilities 2011 (427) Energy, Climate, & Infrastructure Security Executive Summary...

  20. Communicating with the public

    SciTech Connect (OSTI)

    Blumenthal, M. [Scrap Tire Management Council, Washington, DC (United States)

    1998-12-31T23:59:59.000Z

    As industries move forward with their daily activities or attempt to introduce new technologies or changes to their operations, they encounter a series of reactions from the regulatory community and the public. How a company approaches and deals with these factors that can influence the general perception of a situation can greatly affect the duration of the process and the severity of the reactions. One of the most critical components that can have impact this process is how you communicate with the public. From the experiences gained in the field, a method for communicating with the public has been developed that can assist a combustion facility in this effort.

  1. A Full Key Recovery Attack on HMAC-AURORA-512

    E-Print Network [OSTI]

    A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

  2. Why Hierarchical Key Distribution is Appropriate for Multicast Networks

    E-Print Network [OSTI]

    Zheng, Yuliang

    Why Hierarchical Key Distribution is Appropriate for Multicast Networks Chandana Gamage, Jussipekka rationale for many key distribution schemes for multicast networks are based on heuristic arguments on e of multicast group formation and network growth to look at the selection of a key distribution scheme from

  3. Secret-key generation with correlated sources and noisy channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-key generation with correlated sources and noisy channels Ashish Khisti EECS Dept. MIT for secret-key generation between remote terminals is considered. The sender communicates to the receiver discrete memoryless sources. Lower and upper bounds for the secret-key rate are presented and shown

  4. Interactive Secret Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Interactive Secret Key Generation over Reciprocal Fading Channels Ashish Khisti Dept. of Electrical--We study a two-terminal secret-key generation problem over a two-way, approximately reciprocal, block of the secret-key is gen- erated from the correlated channel state sequences by creating omniscience between

  5. Protecting Secret Keys with Personal Entropy Carl Ellison

    E-Print Network [OSTI]

    Schneier, Bruce

    Protecting Secret Keys with Personal Entropy Carl Ellison Cybercash, Inc., cme@cybercash.com Chris technology often requires users to protect a secret key by selecting a password or passphrase. While a good to recover the secret key. As time passes, the ability to remember the passphrase fades and the user may

  6. Secret-Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation over Reciprocal Fading Channels Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Nov. 14, 2012 #12;Motivation Secret-Key Generation in Wireless, 2012 2/ 22 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  7. Secret-Key Generation from Channel Reciprocity: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation from Channel Reciprocity: A Separation Approach Ashish Khisti Department: Secret-Key Generation Secure Message Transmission Physical Layer Authentication Jamming Resistance Feb 11, 2013 2/ 20 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  8. Security proof for quantum key distribution using qudit systems

    SciTech Connect (OSTI)

    Sheridan, Lana [Centre for Quantum Technologies, National University of Singapore (Singapore); Scarani, Valerio [Centre for Quantum Technologies, National University of Singapore (Singapore); Department of Physics, National University of Singapore (Singapore)

    2010-09-15T23:59:59.000Z

    We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d. The finite key corrections are found to be almost insensitive to d < or approx. 20.

  9. Secure Broadcasting of a Common Message with Independent Secret Keys

    E-Print Network [OSTI]

    Khisti, Ashish

    Secure Broadcasting of a Common Message with Independent Secret Keys Rafael F. Schaefer Department broadcasting with indepen- dent secret keys is studied. The particular scenario is analyzed where a common of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers

  10. Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    @sabanciuniv.edu Abstract--Key distribution is an important issue to provide security in Wireless Sensor Networks (WSNs. For the performance evaluation basis, we used our mechanism together with a location based key pre-distribution scheme Terms--mobile wireless sensor networks, key ring update, security, resiliency, connectivity I

  11. Public Works Transportation Infrastructure Study

    E-Print Network [OSTI]

    Minnesota, University of

    Public Works Transportation Infrastructure Study Minneapolis City of Lakes Minneapolis Public Works Transportation Infrastructure Study #12;Public Works Transportation Infrastructure Study Minneapolis City Works Transportation Infrastructure Study Minneapolis City of Lakes Background: · Currently, funding

  12. Regional Public Coordination Transportation Plan Texoma Region #22

    E-Print Network [OSTI]

    Texoma Council of Governments

    2006-12-01T23:59:59.000Z

    in conjunction with TxDOT to increase public awareness of the project. As an integral part of this project, each of the 24 regions studying public transportation in their area was charged with assessing Barriers, Constraints and Best Practices in public... Sherman TAPS TAPS TAPS operates in seven (7) counties, with three (3) of the counties in the Texoma Region. TAPS services include demand response, commuter bus services and special services. Square Miles Population ?00 Rider Trips ?05 Clay 1...

  13. SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key

    E-Print Network [OSTI]

    Sheldon, Nathan D.

    SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key Chunhua Chen1 , Chris J.mitchell@rhul.ac.uk Abstract. Most SSL/TLS-based electronic commerce (e-commerce) ap- plications (including Internet banking a server effectively, and because user authentication methods are typi- cally decoupled from SSL

  14. Heart Failure Symposium: Promoting Knowledge and Self-Care: The Keys to

    E-Print Network [OSTI]

    Kim, Duck O.

    Heart Failure Symposium: Promoting Knowledge and Self-Care: The Keys to a Woman's Healthy Heart This is the Fourth Annual UConn Health Center Heart Failure Symposium. This year we will focus on women and heart disease. The program will include presentations on heart disease and healthy living for women

  15. Measuring the erodibility of soil materials constituting earth embankments: a key input for dams and levees

    E-Print Network [OSTI]

    Boyer, Edmond

    Measuring the erodibility of soil materials constituting earth embankments: a key input for dams of hydraulic embankment structures, including earth embankment dams, levees and dykes, is a major concern all over the world. Still today, about one to two large dams fail every year and hundreds, probably

  16. Microsoft Word - fact sheet alternatives and key findings 090214...

    National Nuclear Security Administration (NNSA)

    health of workers and the public. Worker dose would result in additional latent cancer fatality risk of a maximum of 1 chance in 100,000. Public dose would result in...

  17. Public Utilities Act (Illinois)

    Broader source: Energy.gov [DOE]

    This act aims to make energy services in the state reliable and efficient, while preserving the quality if the environment. It states the duties of public utilities in terms of accounts and reports...

  18. 130517 - Public Meeting - Notepad

    Broader source: Energy.gov (indexed) [DOE]

    is intended to be built whether or not Page 4 130517 - Public Meeting 6 the Baja WindEnergia Sierra Project is constructed. 7 Now, before I begin calling on speakers, I'm 8...

  19. Petroleum Institute Scholarly Publications

    E-Print Network [OSTI]

    2008 #12;- 5 - Scholarly Publications 2007 | The Petroleum Institute Patents Chemical Engineering Editor: C. Brandt Program Editors: K. Nandakumar Chemical Engineering A. A. Shehada Electrical Engineering A. Goharzadeh Mechanical Engineering F. Akgun Engineering S. Morad Petroleum Geosciences H. L. Lim

  20. Focus Series: Program Finds Community "Readiness" Is the Key...

    Energy Savers [EERE]

    by the U.S. Department of Energy's (DOE'S) Better Buildings Neighborhood Program. michiganfocusseriesbbeficiencyprogram.pdf More Documents & Publications Community...

  1. Sandia National Laboratories: Biofuels Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SystemsRenewable EnergyBiomassBiofuelsBiofuels Publications Biofuels Publications Undergirded by the powerful capabilities, state-of-the-art facilities, and brilliant minds that...

  2. New research, publications and videos

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    New research, publications and videos Alumni Link: Opportunities, News and Resources for Former Employees Latest Issue:March 2015 All Issues submit New research, publications...

  3. BBEE Public Utility Conference Call

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    BBEE Public Utility Conference Call May 19, 2011 - Summary Summer Goodwin, BPA, welcomed public utility representative participants, asked them to introduce themselves, and...

  4. Publications of Los Alamos research, 1985

    SciTech Connect (OSTI)

    Sheridan, C.J.; McClary, W.J.; Rich, J.A.; Dussart, S.A.

    1986-11-01T23:59:59.000Z

    This bibliography is a compilation of unclassified publications of work done at the Los Alamos National Laboratory for 1985, including laboratory reports, papers released as non-laboratory reports, journal articles, books, conference papers, papers published in congrssional hearings, theses, and US patents. (LEW)

  5. JANUARY 12, 2011 REDACTED FOR PUBLIC RELEASE

    E-Print Network [OSTI]

    Christian, Eric

    ____________________________________________________________________________ REPORT. NO. IG-11-010-R OFFICE OF AUDITS REVIEW OF NASA'S MANAGEMENT OF ITS SMALL BUSINESS INNOVATION RESEARCH PROGRAM OFFICE OF INSPECTOR GENERAL National Aeronautics and Space Administration #12;REDACTED FOR PUBLIC RELEASE REPORT No. IG-11-010-R-R THE FULL VERSION OF APPENDICES B AND E TO THIS REPORT INCLUDED

  6. INSTITUTE FOR PUBLIC HEALTH AND MEDICINE

    E-Print Network [OSTI]

    Engman, David M.

    with the health scientists and clinicians across the Northwestern campus (including Primary Care MedicineINSTITUTE FOR PUBLIC HEALTH AND MEDICINE AT NORTHWESTERN MEDICINE CENTER FOR ENGINEERING AND HEALTH AND HEALTH ENGINEERING THE HEALTHCARE SYSTEM OF THE FUTURE "Let us imagine together a new world of healthcare

  7. Master of Public Affairs Degree Program

    E-Print Network [OSTI]

    Wisconsin at Madison, University of

    , including specialists in health, energy, education, housing, and transportation u governor's policy advisor in calculus or statistics Candidates who have taken these suggested courses prior to enrolling will be better, public management, educa- tion funding and policy, welfare, emergency manage- ment, the economics

  8. FTA Public Transportation on Indian Reservations Program

    Broader source: Energy.gov [DOE]

    The Federal Transit Administration (FTA) announces the availability of approximately $5 million in funding is to support planning, capital, and, in limited circumstances, operating assistance for tribal public transit services. Eligible applicants include federally recognized Tribes or Alaska Native villages, groups, or communities.

  9. Public participation in environmental impact assessment: why, who and how?

    SciTech Connect (OSTI)

    Glucker, Anne N., E-mail: anne.glucker@gmx.de [Copernicus Institute of Sustainable Development, Utrecht University, P.O. Box 80115, 3508 TC (Netherlands); Driessen, Peter P.J., E-mail: p.driessen@uu.nl [Copernicus Institute of Sustainable Development, Utrecht University, P.O. Box 80115, 3508 TC (Netherlands); Kolhoff, Arend, E-mail: akolhoff@eia.nl [Netherlands Commission for Environmental Assessment, P.O. Box 2345, 3500 GH Utrecht (Netherlands)] [Netherlands Commission for Environmental Assessment, P.O. Box 2345, 3500 GH Utrecht (Netherlands); Runhaar, Hens A.C., E-mail: h.a.c.runhaar@uu.nl [Copernicus Institute of Sustainable Development, Utrecht University, P.O. Box 80115, 3508 TC (Netherlands)

    2013-11-15T23:59:59.000Z

    Even a cursory glance at the literature on environmental impact assessment (EIA) reveals that public participation is being considered as an integral part of the assessment procedure. Public participation in EIA is commonly deemed to foster democratic policy-making and to render EIA more effective. Yet a closer look at the literature unveils that, beyond this general assertion, opinions of the precise meaning, objectives and adequate representation of public participation in EIA considerably diverge. Against this background, in this article we aim to provide a comprehensive overview of the academic debate on public participation in EIA concerning its meaning, objectives and adequate level of inclusiveness. In so doing, we hope to stimulate a more focused debate on the subject, which is key to advancing the research agenda. Furthermore, this paper may serve as a starting point for practitioners involved in defining the role of public participation in EIA practice. -- Highlights: • There is little reflection on the meaning, objectives and adequate level of inclusiveness of public participation in EIA. • We provide a comprehensive overview of the academic debate on public participation in EIA concerning the meaning, objectives and adequate level of inclusiveness. • Theoretical claims put forth by scholars are contrasted with empirical evidence. • Overview shall stimulate a more focused debate on the subject. • This paper may serve as a starting point for practitioners involved in defining the role of public participation in EIA.

  10. Public Domain, Public Interest, Public Funding: Focussing on the ‘Three P’s’ in Scientific Research 

    E-Print Network [OSTI]

    Waelde, Charlotte

    2005-01-01T23:59:59.000Z

    The paper discusses the ‘three Ps’ of scientific research: Public Domain; Public Interest; Public Funding by examining difficulties faced by scientists engaged in scientific research. It discusses the problems faced when ...

  11. Secret key distillation from shielded two-qubit states

    E-Print Network [OSTI]

    Joonwoo Bae

    2010-09-22T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  12. Secret key distillation from shielded two-qubit states

    SciTech Connect (OSTI)

    Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

    2010-05-15T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  13. Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs

    E-Print Network [OSTI]

    Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs Tetsu Iwata1 and Lei Wang2 of the zero block, and is assumed to be publicly known data for verification. ISO/IEC 9797-1:2011 illustrates check value with the ISO/IEC 9797-1 MACs. Keywords: ANSI X9.24-1:2009, key check value, ISO/IEC 9797

  14. Review of a Proposed Quarterly Coal Publication

    SciTech Connect (OSTI)

    Not Available

    1981-01-01T23:59:59.000Z

    This Review of a Proposed Quartery Coal Publication contains findings and recommendations regarding the content of a new summary Energy Information Administration (EIA) coal and coke publication entitled The Quarterly Coal Review (QCR). It is divided into five sections: results of interviews with selected EIA data users; identification of major functions of the coal and coke industries; analysis of coal and coke data collection activities; evaluation of issues conerning data presentation including recommendations for the content of the proposed QCR; and comparison of the proposed QCR with other EIA publications. Major findings and recommendations are as follows: (1) User interviews indicate a definite need for a compehensive publication that would support analyses and examine economic, supply and demand trends in the coal industry; (2) the organization of the publication should reflect the natural order of activities of the coal and coke industries. Based on an analysis of the industries, these functions are: production, stocks, imports, exports, distribution, and consumption; (3) current EIA coal and coke surveys collect sufficient data to provide a summary of the coal and coke industries on a quarterly basis; (4) coal and coke data should be presented separately. Coke data could be presented as an appendix; (5) three geographic aggregations are recommended in the QCR. These are: US total, coal producing districts, and state; (6) coal consumption data should be consolidated into four major consumer categories: electric utilities, coke plants, other industrial, and residential commercial; (7) several EIA publications could be eliminated by the proposed QCR.

  15. NOTICE OF PUBLIC HEARING City of Industry Renewable Energy Resources

    E-Print Network [OSTI]

    NOTICE OF PUBLIC HEARING City of Industry Renewable Energy Resources Procurement Plan & Enforcement a public hearing to consider the adoption of the City of Industry Renewable Energy Resources Procurement to procure a minimum quantity of electricity products from eligible renewable energy resources, including

  16. NIST Special Publication 800-160 Initial Public Draft

    E-Print Network [OSTI]

    the Federal Information Security Management Act (FISMA), Public Law (P.L.) 107-347. NIST is responsible agencies may wish to closely follow the development of these new publications by NIST. OrganizationsNIST Special Publication 800-160 Initial Public Draft Systems Security Engineering An Integrated

  17. From Public Housing to Regulated Public Environments: The Redevelopment of San Francisco’s Public Housing

    E-Print Network [OSTI]

    Rongerude, Jane

    2007-01-01T23:59:59.000Z

    public interest, SFHA is rapidly adopting new and improved industry standards in operations and management,management of poverty and forge new institutional bonds between the public

  18. Revised January 2012 Appendix I Animals (including insects and fish)

    E-Print Network [OSTI]

    conducted) 2. Will you be generating any genetically modified organisms? If yes, what animals and how? N/A 3 derivative) RG1 Farq / 123A *PHAC- Public Health Agency of Canada **CFIA- Canadian Food Inspection Agency

  19. A national assessment of wildlife information transfer to the public

    E-Print Network [OSTI]

    Lindsey, Kieran Jane

    2004-11-15T23:59:59.000Z

    agency mission and record-keeping, as well as public demand for information and agency response concerning non-traditional wildlife issues, including: conflicts between humans and wildlife; human health and safety; attracting wildlife; viewing wildlife...

  20. Intercept-resend attacks in the Bennett-Brassard 1984 quantum key distribution protocol with weak coherent pulses

    E-Print Network [OSTI]

    Marcos Curty; Norbert Lütkenhaus

    2005-02-20T23:59:59.000Z

    Unconditional security proofs of the Bennett-Brassard protocol of quantum key distribution have been obtained recently. These proofs cover also practical implementations that utilize weak coherent pulses in the four signal polarizations. Proven secure rates leave open the possibility that new proofs or new public discussion protocols obtain larger rates over increased distance. In this paper we investigate limits to error rate and signal losses that can be tolerated by future protocols and proofs.

  1. At A Glance Environmental Public Health

    E-Print Network [OSTI]

    Grantees TM #12;Environmental Public Health Tracking 2 Environmental Public Health Tracking: Linking

  2. QKD with finite resources: secret key rates via Rényi entropies

    E-Print Network [OSTI]

    Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bruß

    2011-05-27T23:59:59.000Z

    A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  3. Security proof of practical quantum key distribution schemes

    E-Print Network [OSTI]

    Yodai Watanabe

    2005-06-29T23:59:59.000Z

    This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

  4. Fake state attack on practically decoy state quantum key distribution

    E-Print Network [OSTI]

    Yong-gang Tan

    2012-02-15T23:59:59.000Z

    In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

  5. ARM - Publications Procedures

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadap Documentation TDMADAP :ProductsVaisala CL51 ceilometergovPublicationsPublications Procedures

  6. Public Affairs Department

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclear Press Releases ArchiveServices »ProjectsPublic AccessPublic

  7. Publications - Cyclotron Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclear Press Releases ArchiveServicesPublicationPublications

  8. Management of Public Communications Publications, and Scientific, Engineering, and Technical Publications

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1979-08-10T23:59:59.000Z

    This order prescribes policies, standards, and procedures for effective management of Department of Energy (DOE) publications.

  9. Sandia Energy - Direct Measurement of Key Molecule Will Increase...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Direct Measurement of Key Molecule Will Increase Accuracy of Combustion Models Home Energy Transportation Energy CRF Facilities News News & Events Computational Modeling &...

  10. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  11. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  12. Key Parameters Affecting DPF Performance Degradation and Impact...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy...

  13. Sierra Geothermal's Key Find in Southern Nevada | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at...

  14. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

  15. Key Facts about the Biosciences Division | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to understand biological mechanisms relevant to bioremediation, climate change, energy production, and the protection of human health. BiosciencesDivisionKeyFactsOct20...

  16. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29T23:59:59.000Z

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  17. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

  18. PPPL physicists win supercomputing time to simulate key energy...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PPPL physicists win supercomputing time to simulate key energy and astrophysical phenomena By John Greenwald January 8, 2013 Tweet Widget Google Plus One Share on Facebook A...

  19. Public perspectives on nuclear security. US national security surveys, 1993--1997

    SciTech Connect (OSTI)

    Herron, K.G.; Jenkins-Smith, H.C. [Univ. of New Mexico, Albuquerque, NM (United States). UNM Inst. for Public Policy

    1998-08-01T23:59:59.000Z

    This is the third report in a series of studies to examine how US attitudes about nuclear security are evolving in the post-Cold War era and to identify trends in public perceptions and preferences relevant to the evolution of US nuclear security policy. It presents findings from three surveys: a nationwide telephone survey of randomly selected members of the US general public; a written survey of randomly selected members of American Men and Women of Science; and a written survey of randomly selected state legislators from all fifty US states. Key areas of investigation included nuclear security, cooperation between US and Russian scientists about nuclear issues, vulnerabilities of critical US infrastructures and responsibilities for their protection, and broad areas of US national science policy. While international and US national security were seen to be slowly improving, the primary nuclear threat to the US was perceived to have shifted from Russia to China. Support was found for nuclear arms control measures, including mutual reductions in stockpiles. However, respondents were pessimistic about eliminating nuclear armaments, and nuclear deterrence continued to be highly values. Participants favored decreasing funding f/or developing and testing new nuclear weapons, but supported increased investments in nuclear weapons infrastructure. Strong concerns were expressed about nuclear proliferation and the potential for nuclear terrorism. Support was evident for US scientific cooperation with Russia to strengthen security of Russian nuclear assets. Elite and general public perceptions of external and domestic nuclear weapons risks and external and domestic nuclear weapons benefits were statistically significantly related to nuclear weapons policy options and investment preferences. Demographic variables and individual belief systems were systematically related both to risk and benefit perceptions and to policy and spending preferences.

  20. MSTD 2007 Publications and Patents

    SciTech Connect (OSTI)

    King, W E

    2008-04-01T23:59:59.000Z

    The Materials Science and Technology Division (MSTD) supports the central scientific and technological missions of the Laboratory, and at the same time, executes world-class, fundamental research and novel technological development over a wide range of disciplines. Our organization is driven by the institutional needs in nuclear weapons stockpile science, high-energy-density science, nuclear reactor science, and energy and environment science and technology. We maintain expertise and capabilities in many diverse areas, including actinide science, electron microscopy, laser-materials interactions, materials theory, simulation and modeling, materials synthesis and processing, materials science under extreme conditions, ultrafast materials science, metallurgy, nanoscience and technology, nuclear fuels and energy security, optical materials science, and surface science. MSTD scientists play leadership roles in the scientific community in these key and emerging areas.

  1. Public Relations Press Release

    E-Print Network [OSTI]

    Tübingen, Universität

    noticeable and widely differing effects on agriculture and societies in the Ancient Near East change and drought in ancient times Tübingen archaeobotanist probes ancient grains to map drought stress on agriculture is believed to be a key factor in the rise and fall of societies in the Ancient Near East. Dr

  2. Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

    E-Print Network [OSTI]

    Eleni Diamanti; Anthony Leverrier

    2015-06-09T23:59:59.000Z

    The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.

  3. Publications Edited Volume

    E-Print Network [OSTI]

    MacIver, Malcolm A.

    of Robots with Passive Environments: Application to Force Feedback Control Ed Colgate and Neville Hogan, J. Edward Colgate Industrial Robot, 26 (5), 1999, pp 335-341 Toward Robot-Assisted VascularPublications Edited Volume Advances in Robotics, Mechatronics, and Haptic Interfaces 1993 Edited

  4. QTR Public Webinar 1

    Broader source: Energy.gov [DOE]

    This is the second public webinar hosted by the Office of the Under Secretary for Science and Energy to describe work in progress on the QTR 2015. The comment process following this webinar, will provide an opportunity for stakeholders and experts to provide input.

  5. Robert Reedy Publications

    E-Print Network [OSTI]

    Yang, Zong-Liang

    ., Aquifers of West Texas: San Angelo, Texas, Texas Water Development Board, Report 360, p. 269­291. ArticlesRobert Reedy Publications July 8, 2008 Business address: The University of Texas at Austin Bureau of Economic Geology University Station, Box X Austin, Texas 78713-8924 (512) 471-7244 E-mail address: bob

  6. Randal E. Bryant Publications

    E-Print Network [OSTI]

    Bryant, Randal E.

    Randal E. Bryant Publications Books and Book Chapters R. E. Bryant, and D. R. O'Hallaron, Computer at http://csapp.cs.cmu.edu/. R. E. Bryant, and J. H. Kukula, "Formal Methods for Functional Verification Publishers, 2003, pp. 3­16. Available as http://www.cs.cmu.edu/~bryant/pubdir/iccad-best02.pdf. R. E. Bryant

  7. Randal E. Bryant Publications

    E-Print Network [OSTI]

    Treuille, Adrien

    Randal E. Bryant Publications Books and Book Chapters R. E. Bryant, and D. R. O'Hallaron, Computer at http://csapp.cs.cmu.edu/. R. E. Bryant, and J. H. Kukula, ``Formal Methods for Functional Verification Publishers, 2003, pp. 3--16. Available as http://www.cs.cmu.edu/�bryant/pubdir/iccad­best02.pdf. R. E. Bryant

  8. OSCAR P. BRUNO PUBLICATIONS

    E-Print Network [OSTI]

    . P. Bruno. Submitted to Proc. Roy. Soc. Edinburgh. Available at http://arxiv. org/pdf/1204.3699v1.pdf laws", K. Shahbazi, N. Albin, O. P. Bruno, J. S. Hesthaven, Journal of Computational Physics 230, 8779OSCAR P. BRUNO PUBLICATIONS · "Higher-Order Linear-Time Unconditionally Stable ADI Methods

  9. Publications Peer reviewed articles

    E-Print Network [OSTI]

    Reimchen, Thomas E.

    Publications Peer reviewed articles Deagle, B.E., N.J. Gales and M.A. Hindell (2008) Variability polymerase chain reaction. Marine Biotechnology 7:11-20 Patil, J.G., R. M. Gunasekera, B.E. Deagle, N.J. Bax dinoflagellate, Gymnodinium catenatum (Graham) in ballast water and environmental samples. Biological Invasions 7

  10. Bradley J Lucier: Publications

    E-Print Network [OSTI]

    Undergraduate · Graduate · Applied Math · Actuarial · Courses ... Publications listed in Math Reviews as of September 17, 2013. See also "Other ... In Mathematical methods in computer aided geometric design, II (Biri, 1991), pages 391-400. .... Engineering in Medicine and Biology Magazine, 14(5):570-577, 1995. Ronald A.

  11. Public Health FAT FACTORS

    E-Print Network [OSTI]

    Qian, Ning

    : THE UNITED STATES SPENDS MORE ON HEALTH CARE THAN ANY OTHER COUNTRY. YET WE CONTINUE TO FALL FAR BEHIND States spends an astonishing percent of our gross domestic product on health care--significantly moreColumbia Public Health HOT TOPIC Climate Change FAT FACTORS Obesity Prevention BOOK SMART

  12. TRINITY HALL PUBLICATION SCHEME

    E-Print Network [OSTI]

    Lasenby, Joan

    TRINITY HALL PUBLICATION SCHEME PART 2 Main categories The main groups of classes of information Trinity Hall was founded in 1350 by William Bateman, Bishop of Norwich, as a common law corporation to the University and College Statutes. The Education (Listed Bodies) Order 1997 recognises Trinity Hall

  13. GREET Bioenergy Life Cycle Analysis and Key Issues for Woody...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems, Argonne National Laboratory wangbiomass2014.pdf More Documents & Publications Resource Assessment and Land Use Change Bioenergy Technologies Office Multi-Year Program...

  14. Occupancy by key transcription factors is a more accurate predictor...

    Office of Scientific and Technical Information (OSTI)

    USDOE Country of Publication: United States Language: English Subject: functional genomics; gene regulation; TAL1; GATA1; histone modifications; enhancer assay Word Cloud More...

  15. Vehicle Electrification is Key to Reducing Petroleum Dependency...

    Broader source: Energy.gov (indexed) [DOE]

    Petroleum Dependency and Greenhouse Gas Emission More Documents & Publications Energy Storage R&D and ARRA Battery Pack Requirements and Targets Validation FY 2009 DOE Vehicle...

  16. PEM Fuel Cell Technology, Key Research Needs and Approaches ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    icitationwkshopjan08jarvi.pdf More Documents & Publications Idaho Operations AMWTP Fact Sheet Heating Ventilation and Air Conditioning Efficiency Greenpower Trap Mufflerl System...

  17. Rapid Compression Machine ? A Key Experimental Device to Effectively...

    Broader source: Energy.gov (indexed) [DOE]

    More Documents & Publications Expanding Robust HCCI Operation (Delphi CRADA) Gasoline-like fuel effects on advanced combustion regimes Non-Petroleum-Based Fuel...

  18. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    group key establish- ment. We identify seven social and situational factors which impact group formationMind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren Studer Adrian Perrig Carnegie Mellon University {cykuo, astuder, perrig}@cmu.edu ABSTRACT Group

  19. Key ornamental innovations facilitate diversification in an avian radiation

    E-Print Network [OSTI]

    Rubenstein, Dustin R.

    Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

  20. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  1. Reflective cracking of shear keys in multi-beam bridges

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02T23:59:59.000Z

    ..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

  2. USB KEY PROFILE MANAGER FOR MOZILLA A Project Report

    E-Print Network [OSTI]

    Pollett, Chris

    USB KEY PROFILE MANAGER FOR MOZILLA A Project Report Presented to The Faculty of the Department FOR THE UNIVERSITY _____________________________________________________ 3 #12;ABSTRACT USB KEY PROFILE MANAGER FOR MOZILLA By Yun Zhou Mozilla's profile manager allows users to save their private information

  3. Secret-Key Generation using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Generation using Correlated Sources and Channels Ashish Khisti, Member, IEEE of generating a shared secret key between two terminals in a joint source-channel setup -- the terminals to correlated discrete memoryless source sequences. We establish lower and upper bounds on the secret

  4. Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyytia

    E-Print Network [OSTI]

    Hyytiä, Esa

    Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyyti¨a Telecommunications Research Center can be used in several ways. One interesting application of the Shamir's secret sharing scheme in the context of privacy aware traffic monitoring is to escrow a secret key after m suspicious events have been

  5. accident conditions key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accident conditions key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Range Condition: Key to...

  6. Abstract--In this paper, a new methodology for stability assessment of a smart power system is proposed. The key to this

    E-Print Network [OSTI]

    Pota, Himanshu Roy

    ANY of the public infrastructures like electric power network are subject to two types of threats networks approach to electric power network security would identify key vulnerabilities, assess vulnerability of the North American power grid was studied after the August 2003 blackout affecting the United

  7. Nuclear Arms Control R&D Consortium includes Los Alamos

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Arms Control R&D Consortium includes Los Alamos Nuclear Arms Control R&D Consortium includes Los Alamos A consortium led by the University of Michigan that includes LANL as...

  8. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22T23:59:59.000Z

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  9. A Roadmap to Success: Hiring, Retaining, and Including People...

    Broader source: Energy.gov (indexed) [DOE]

    A Roadmap to Success: Hiring, Retaining, and Including People with Disabilities A Roadmap to Success: Hiring, Retaining, and Including People with Disabilities December 5, 2014...

  10. [Article 1 of 7: Motivates and Includes the Consumer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and include the consumer exist. Some examples include advanced two-way metering (AMI), demand response (DR), and distributed energy resources (DER). A common misconception is...

  11. Including Retro-Commissioning in Federal Energy Savings Performance...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Including Retro-Commissioning in Federal Energy Savings Performance Contracts Including Retro-Commissioning in Federal Energy Savings Performance Contracts Document describes...

  12. Investigations into the Nature of Halogen Bonding Including Symmetry...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    into the Nature of Halogen Bonding Including Symmetry Adapted Perturbation Theory Analyses. Investigations into the Nature of Halogen Bonding Including Symmetry Adapted...

  13. Public Housing The following public housings are also available; however,

    E-Print Network [OSTI]

    Banbara, Mutsunori

    121 Public Housing The following public housings are also available; however, these are not limited Hyogo Prefecture Housing Only for Family Hyogo Prefecture Public Corp. Rental Accommodation Single or Family Kobe City Housing Only for Family URL Housing Informaition http://www.kobe-u.ac.jp/international/student/guidebook/housing

  14. Sandia Energy - EC Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiationImplementing Nonlinear Buoyancy and Excitation Forces inInvestigatingKauaiKey

  15. Environmental Public Health Performance Standards

    E-Print Network [OSTI]

    Environmental Public Health Performance Standards Environmental Health Program Self Agency: Total Environmental Health Program Budget: #12;Environmental Public Health Performance Standards (v. 2.0); Environmental Health Program Assessment Instrument, 1/7/2010 Page 2 Proportion

  16. as Catalyst in Public Health

    E-Print Network [OSTI]

    Bushman, Frederic

    Crisis as Catalyst in Public Health Immigration Reform and the Threat of Rhetorical Violence look at immigration reform and the impact of public discourse focused on this topic. The panel

  17. Public Input I would like to suggest that FESAC consider including in your response to the charge on

    E-Print Network [OSTI]

    pinch devices. One important aspect of such collaborations is the relevance to tokamaks and specifically experiment called KTX has been funded for construction at the University of Science and Technology of China

  18. IEEE Citation Reference IEEE Publications uses Webster's College Dictionary, 4th Edition. For guidance on grammar and usage not included

    E-Print Network [OSTI]

    Bifano, Thomas

    . Brake, Ed. New York: Wiley, 1994, pp. 55-70. [3] R. L. Myer, "Parametric oscillators and nonlinear materials," in Nonlinear Optics, vol. 4, P. G. Harper and B. S. Wherret, Eds. San Francisco, CA: Academic. Lupatkin, "V-line surface-wave radiation and scanning," Dept. Elect. Eng., New York, Sci. Rep. 85, Aug

  19. California Sea Grant Publication Announcement Contributors to this book include Larry Madin, Tom Frazer, Langdon Quetin and Lynn

    E-Print Network [OSTI]

    Wiegner, Tracy N.

    Scientific Blue-Water Diving Steven H.D. Haddock Monterey Bay Aquarium Research Institute John N. Heine Moss

  20. Environmental Public Health Performance Standards

    E-Print Network [OSTI]

    Environmental Public Health Performance Standards (Version 2.0) Updated May 2014 National Center for Environmental Health Division of Emergency and Environmental Health Services #12;#12;Environmental Public Health Performance Standards (Version 2.0) Updated May 2014 #12;Environmental Public Health Performance Standards

  1. MANAGEMENT CONTROL SYSTEM IN PUBLIC

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    essential aspect of the public management device: compliance with legal rules. Gradually, a new objective of the budgetary system. Thus, public organizations need to create new tools to manage their activities or use, despite the number of reforms adopted in the name of New Public Management, numerous authors also noted

  2. open access journal Public Health

    E-Print Network [OSTI]

    Oakley, Jeremy

    open access journal Journal of Public Health in AfricaeISSN 2038-9930 i www the Journal of Public Health in Africa is a peer-reviewed, electronic quarterly, that focuses on health issues in the African continent. The journal editors seek high quality original articles on public health related issues

  3. KEY CONTROL Keys to University facilities are duplicated and issued by the

    E-Print Network [OSTI]

    Gering, Jon C.

    with incidents that may occur on or off campus. University Vehicles Vehicles may be scheduled by contacting. A number of vehicles, including vans and cars, are available for OFFICIAL USE ONLY. Requests should be made is open 7:30 a.m. to 1:00 a.m. daily to assist University vehicle operators with emergency road situations

  4. Control Systems Security Publications Library | Department of...

    Energy Savers [EERE]

    Publications Library Control Systems Security Publications Library Publications Library Repository of documents, listed by topic. (Some of the documents in this section require...

  5. Essays on Municipal Public Finance in Brazil

    E-Print Network [OSTI]

    Gardner, Rachel Elizabeth

    2013-01-01T23:59:59.000Z

    on Municipal Public Finance in Brazil By Rachel Elizabethon Municipal Public Finance in Brazil by Rachel Elizabethlocal public finance in Brazil, with a focus on how federal

  6. The Poverty Initiative These courses include substantial engagement with the representation of, experiences of, consequences of, or causes of

    E-Print Network [OSTI]

    Aalberts, Daniel P.

    The Poverty Initiative These courses include substantial engagement with the representation of on issues that have indirect implications for poverty, please see the Center for Learning in Action website(S) Poverty and Public Policy (Professor Lara Shore-Sheppard) ECON 468(S) Your Money or Your Life (Professor

  7. Key Factors in Displacement Ventilation Systems for Better IAQ

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  8. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

    2000-01-01T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  9. Reactive Support and Voltage Control Service: Key Issues and Challenges

    E-Print Network [OSTI]

    Gross, George

    reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

  10. Detailed Description of Key NIF Milestones for NNSA Description

    E-Print Network [OSTI]

    1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

  11. Intelligence perfecting the mute keys: Edgar Bowers and Music

    E-Print Network [OSTI]

    Smith, Kevin

    2003-01-01T23:59:59.000Z

    a Generation Know Its Story: The Edgar Bowers Conference andperfecting the mute keys: Edgar Bowers and Music” by C.and model for the poetry of Edgar Bowers. From his earliest

  12. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25T23:59:59.000Z

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  13. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14T23:59:59.000Z

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  14. Secret-Key Generation Using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source ...

  15. A Key Target for Diabetes Drugs | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Target for Diabetes Drugs JULY 26, 2013 Bookmark and Share The structure of the human glucagon receptor,...

  16. Self-referenced continuous-variable quantum key distribution

    E-Print Network [OSTI]

    Soh, Daniel B S; Coles, Patrick J; Lütkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

    2015-01-01T23:59:59.000Z

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

  17. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  18. Platforms and Methods for Acoustic Detection and Monitoring of Key

    E-Print Network [OSTI]

    Hawai'i at Manoa, University of

    #12;Platforms and Methods for Acoustic Detection and Monitoring of Key Ecosystem Properties Nils Olav Handegard #12;· Introduction · Platforms carrying acoustics · Methods · Applications ­ What we have done · Applications ­ What we would like to do #12;· Introduction · Platforms carrying acoustics

  19. W-like bound entangled states and secure key distillation

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-09T23:59:59.000Z

    We construct multipartite entangled states with underlying W-type structure satisfying positive partial transpose (PPT) condition under any (N-1)|1 partition. Then we show how to distill N-partite secure key form the states using two different methods: direct application of local filtering and novel random key distillation scheme in which we adopt the idea form recent results on entanglement distillation. Open problems and possible implications are also discussed.

  20. Security of quantum key distribution with arbitrary individual imperfections

    E-Print Network [OSTI]

    Řystein Marřy; Lars Lydersen; Johannes Skaar

    2010-06-01T23:59:59.000Z

    We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

  1. Securing a Quantum Key Distribution Network Using Secret Sharing

    E-Print Network [OSTI]

    Barnett, Stephen M

    2012-01-01T23:59:59.000Z

    We present a simple new technique to secure quantum key distribution relay networks using secret sharing. Previous techniques have relied on creating distinct physical paths in order to create the shares. We show, however, how this can be achieved on a single physical path by creating distinct logical channels. The technique utilizes a random 'drop-out' scheme to ensure that an attacker must compromise all of the relays on the channel in order to access the key.

  2. NERSC Staff Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1AllocationsNOVAPlayed Key Role in Workflow

  3. This article has been accepted for publication by ISPEC 2014, but has not been fully edited. Content may change prior to final publication. Citation information

    E-Print Network [OSTI]

    Implementation of MQ Asymmetric Cipher PMI+ on FPGAs Shaohua Tang , Bo Lv , Guomin Chen , and Zhiniang Peng@IEEE.org, csshtang@scut.edu.cn Abstract. PMI+ is a Multivariate Quadratic (MQ) public key algo- rithm used on FPGAs to effi- ciently implement PMI+ in this paper. Our main contributions are that, firstly

  4. The living publication

    SciTech Connect (OSTI)

    Terwilliger, Thomas C. [Los Alamos National Laboratory

    2012-06-04T23:59:59.000Z

    Within the ICSTI Insights Series we offer three articles on the 'living publication' that is already available to practitioners in the important field of crystal structure determination and analysis. While the specific examples are drawn from this particular field, we invite readers to draw parallels in their own fields of interest. The first article describes the present state of the crystallographic living publication, already recognized by an ALPSP (Association of Learned and Professional Society Publishers) Award for Publishing Innovation in 2006. The second article describes the potential impact on the record of science as greater post-publication analysis becomes more common within currently accepted data deposition practices, using processed diffraction data as the starting point. The third article outlines a vision for the further improvement of crystallographic structure reports within potentially achievable enhanced data deposition practices, based upon raw (unprocessed) diffraction data. The IUCr in its Commissions and Journals has for many years emphasized the importance of publications being accompanied by data and the interpretation of the data in terms of atomic models. This has been followed as policy by numerous other journals in the field and its cognate disciplines. This practice has been well served by databases and archiving institutions such as the Protein Data Bank (PDB), the Cambridge Crystallographic Data Centre (CCDC), and the Inorganic Crystal Structure Database (ICSD). Normally the models that are archived are interpretations of the data, consisting of atomic coordinates with their displacement parameters, along with processed diffraction data from X-ray, neutron or electron diffraction studies. In our current online age, a reader can not only consult the printed word, but can display and explore the results with molecular graphics software of exceptional quality. Furthermore, the routine availability of processed diffraction data allows readers to perform direct calculations of the electron density (using X-rays and electrons as probes) or the nuclear density (using neutrons as probe) on which the molecular models are directly based. This current community practice is described in our first article. There are various ways that these data and tools can be used to further analyze the molecules that have been crystallized. Notably, once a set of results is announced via the publication, the research community can start to interact directly with the data and models. This gives the community the opportunity not only to read about the structure, but to examine it in detail, and even generate subsequent improved models. These improved models could, in principle, be archived along with the original interpretation of the data and can represent a continuously improving set of interpretations of a set of diffraction data. The models could improve both by correction of errors in the original interpretation and by the use of new representations of molecules in crystal structures that more accurately represent the contents of a crystal. These possible developments are described in our second article. A current, significant, thrust for the IUCr is whether it would be advantageous for the crystallographic community to require, rather than only encourage, the archiving of the raw (unprocessed) diffraction data images measured from a crystal, a fibre or a solution. This issue is being evaluated in detail by an IUCr Working Group (see http://forums.iucr.org). Such archived raw data would be linked to and from any associated publications. The archiving of raw diffraction data could allow as yet undeveloped processing methods to have access to the originally measured data. The debate within the community about this much larger proposed archiving effort revolves around the issue of 'cost versus benefit'. Costs can be minimized by preserving the raw data in local repositories, either at centralized synchrotron and neutron research institutes, or at research universities. Archiving raw data is also perceived as bein

  5. acid analysis including: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nairn, John A. 12 A bottom-up analysis of including aviation within theEU's Emissions Trading Scheme Geosciences Websites Summary: A bottom-up analysis of including aviation...

  6. analysis including quantification: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ausloos 2004-12-31 29 A bottom-up analysis of including aviation within theEU's Emissions Trading Scheme Geosciences Websites Summary: A bottom-up analysis of including aviation...

  7. Biomarkers Core Lab Price List Does NOT Include

    E-Print Network [OSTI]

    Grishok, Alla

    v3102014 Biomarkers Core Lab Price List Does NOT Include Kit Cost PURCHASED by INVESTIGATOR/1/2013 Page 1 of 5 #12;Biomarkers Core Lab Price List Does NOT Include Kit Cost PURCHASED by INVESTIGATOR

  8. Example Retro-Commissioning Scope of Work to Include Services...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Retro-Commissioning Scope of Work to Include Services as Part of an ESPC Investment-Grade Audit Example Retro-Commissioning Scope of Work to Include Services as Part of an ESPC...

  9. NREL: Wind Research - Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota Prius being driven inThePublications

  10. CBECS - public use data

    Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122 40CoalLease(Billion2,128 2,469 2,321 2,590 1,550 1,460 1977-2013164 167 20057Public

  11. Responses for Public Release

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOrigin ofEnergy at Waste-to-Energy usingof Enhanced Dr.ResponseEnergyfor Public Release

  12. Sandia Energy - Offshore Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution Grid Integration PermalinkClimateNumericalPublications Home

  13. WIPP - Public Reading Facilities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulenceUtilizeRural Public Reading Facilities/Electronic

  14. Publications | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible forPortsmouth/Paducah47,193.70COMMUNITY AEROSOL INLET8,SynchrotronPublications

  15. Sandia Energy - EC Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (NEAMS) Subcontinuum and Upscaling Task. The work conducted focused on developing a roadmap to include molecular scale, mechanistic information in continuum-scale models of...

  16. Sandia Energy - EC Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    - Led by Sandia National Laboratories - Collaborators include: Manufacturers, Academia, Wind Farm Maintenance, Government Investigators Multi-year Program - Blade Field Survey -...

  17. PUBLIC OUTREACH Fact Sheet

    Energy Savers [EERE]

    across the country. LM's responsibilities include long-term surveillance and maintenance, records management, benefits continuity, property management, land use planning, and...

  18. Sandia Energy - EC Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    including pressure vessels, fire bottles, wind turbines, gas wells, nuclear weapons, and solar collectors. This monograph begins with background topics in acoustics and...

  19. Microwave Technology for Waste Management Applications Including Disposition of Electronic Circuitry

    SciTech Connect (OSTI)

    Wicks, G.G. [Westinghouse Savannah River Company, AIKEN, SC (United States); Clark, D.E. [University of Florida, Gainesville, FL (United States); Schulz, R.L. [University of Flordia, Gainesville, FL (United States)

    1998-06-01T23:59:59.000Z

    Advanced microwave technology is being developed nationally and internationally for a variety of waste management and environmental remediation purposes. These efforts include treatment and destruction of a vast array of gaseous, liquid and solid hazardous wastes as well as subsequent immobilization of hazardous components into leach resistant forms. Microwave technology provides an important contribution to an arsenal of existing remediation methods that are designed to protect the public and environment from the undesirable consequences of hazardous materials. One application of special interest is the treatment of discarded electronic circuitry using a new hybrid microwave treatment process and subsequent reclamation of the precious metals within.

  20. State Lands Management Plan Clark Island at Cedar Key

    E-Print Network [OSTI]

    Slatton, Clint

    resources . . . . . . . . . 21. Plans for Non-renewable Natural and Cultural Resources . . . . 22 and Improvements . . . . . . . . . 4. Proximity to Significant Public Resources . . . . . . . . . . . 5 RESOURCES . . . . . . . . . . . . . . 8. Resources Listed in the Florida Natural Areas Inventory . . . . 9

  1. Andy DuBois, ajd@lanl.gov and phone A key challenge in IS&T is extraction of information from

    E-Print Network [OSTI]

    for using emerging microparallelism, e.g. Cell processors and GPUs, for real-time and near to respond to key challenges of national interest, including cybersecurity, threat reduction, data from

  2. Information Center Complex publications and presentations, 1971-1980

    SciTech Connect (OSTI)

    Gill, A.B.; Hawthorne, S.W.

    1981-08-01T23:59:59.000Z

    This indexed bibliography lists publications and presentations of the Information Center Complex, Information Division, Oak Ridge National Laboratory, from 1971 through 1980. The 659 entries cover such topics as toxicology, air and water pollution, management and transportation of hazardous wastes, energy resources and conservation, and information science. Publications range in length from 1 page to 3502 pages and include topical reports, books, journal articles, fact sheets, and newsletters. Author, title, and group indexes are provided. Annual updates are planned.

  3. Geographic information system applications to public warning systems

    SciTech Connect (OSTI)

    Newsom, D.E.

    1990-01-01T23:59:59.000Z

    This paper describes the capabilities of a geographic information system (GIS), the Integrated Emergency Management Information System (IEMIS), for planning a siren-based public warning system. The Outdoor Sound Propagation Model (OSPM) in IEMIS models warning sirens in a given area and reports the results graphically as sound pressure level contours. As implemented in IEMIS, OSPM includes graphic functions for the preparation and display of input data, display of the model's results, and management of data files. These graphic functions enable public safety personnel to plan more effectively for warning of the public.

  4. Public problems: Still waiting on the marketplace for solutions

    SciTech Connect (OSTI)

    Gover, J. [Sandia National Labs., Albuquerque, NM (United States); Carayannis, E. [George Washington Univ., Washington, DC (United States); Huray, P.

    1997-10-01T23:59:59.000Z

    This report addresses the need for government sponsored R and D to address real public problems. The motivation is that a public benefit of the money spent must be demonstrated. The areas identified as not having appropriate attention resulting in unmet public needs include healthcare cost, cost and benefits of regulations, infrastructure problems, defense spending misaligned with foreign policy objectives, the crime problem, energy impact on the environment, the education problem, low productivity growth industry sectors, the income distribution problem, the aging problem, the propagation of disease and policy changes needed to address the solution of these problems.

  5. Sandia National Laboratories: CSP Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FOR MATERIAL COMPATIBILITY TESTING IN NITRATE SALTS AT TEMPERATURES UP TO 700C Dish Stirling Reliability Improvement and Commercialization ECIS SMU Key Facilities 2011 EERE...

  6. Grid Parity for Residential Photovoltaics in the United States: Key Drivers and Sensitivities; Preprint

    SciTech Connect (OSTI)

    Ong, S.; Denholm, P.; Clark, N.

    2012-08-01T23:59:59.000Z

    In this report, we analyze PV break-even costs for U.S. residential customers. We evaluate some key drivers of grid parity both regionally and over time. We also examine the impact of moving from flat to time-of-use (TOU) rates, and we evaluate individual components of the break-even cost, including effect of rate structure and various incentives. Finally, we examine how PV markets might evolve on a regional basis considering the sensitivity of the break-even cost to four major drivers: technical performance, financing parameters, electricity prices and rates, and policies. We find that electricity price rather than technical parameters are in general the key drivers of the break-even cost of PV. Additionally, this analysis provides insight about the potential viability of PV markets.

  7. Including Retro-Commissioning in Federal Energy Savings Performance

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(Fact Sheet),EnergyImprovement of theResponses to Public Comments onContracts |

  8. Including Retro-Commissioning in Federal Energy Savings Performance

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(Fact Sheet),EnergyImprovement of theResponses to Public Comments onContracts

  9. Introduction to Small-Scale Wind Energy Systems (Including RETScreen...

    Open Energy Info (EERE)

    Introduction to Small-Scale Wind Energy Systems (Including RETScreen Case Study) (Webinar) Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Introduction to Small-Scale...

  10. Laboratory Curiosity rover ChemCam team, including Los Alamos...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MEXICO, August 23, 2012-Members of the Mars Science Laboratory Curiosity rover ChemCam team, including Los Alamos National Laboratory scientists, squeezed in a little extra target...

  11. PLOT: A UNIX PROGRAM FOR INCLUDING GRAPHICS IN DOCUMENTS

    E-Print Network [OSTI]

    Curtis, Pavel

    2013-01-01T23:59:59.000Z

    simple, easy-to-read graphics language designed specificallyPROGRAM FOR INCLUDING GRAPHICS IN DOCUMENTS Pavel Curtismeanings as in the GRAFPAC graphics system. Definl. ~ tions

  12. analysis including plasma: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Assembly 2010 Space Plasmas in the Solar System, including Planetary Magnetospheres (D) Solar Variability, Cosmic Rays and Climate (D21) GEOMAGNETIC ACTIVITY AT HIGH-LATITUDE:...

  13. Energy Department Expands Gas Gouging Reporting System to Include...

    Energy Savers [EERE]

    Washington, DC - Energy Secretary Samuel W. Bodman announced today that the Department of Energy has expanded its gas gouging reporting system to include a toll-free telephone...

  14. arch dams including: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: insight into the gamut of shallow water waves, including kinematic, diffusion, dynamic, and gravity wavesDam-Breach Flood Wave Propagation Using...

  15. Implementation of Quantum Key Distribution with Composable Security Against Coherent Attacks using Einstein-Podolsky-Rosen Entanglement

    E-Print Network [OSTI]

    Tobias Gehring; Vitus Händchen; Jörg Duhme; Fabian Furrer; Torsten Franz; Christoph Pacher; Reinhard F. Werner; Roman Schnabel

    2015-02-10T23:59:59.000Z

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution (QKD) this is achieved without relying on the hardness of mathematical problems which might be compromised by improved algorithms or by future quantum computers. State-of-the-art QKD requires composable security against coherent attacks for a finite number of samples. Here, we present the first implementation of QKD satisfying this requirement and additionally achieving security which is independent of any possible flaws in the implementation of the receiver. By distributing strongly Einstein-Podolsky-Rosen entangled continuous variable (CV) light in a table-top arrangement, we generated secret keys using a highly efficient error reconciliation algorithm. Since CV encoding is compatible with conventional optical communication technology, we consider our work to be a major promotion for commercialized QKD providing composable security against the most general channel attacks.

  16. Publications Foreign Fisheries

    E-Print Network [OSTI]

    .S. fishery products to Japan. Part one includes information on Japanese wholesale markets, major Japanese wholesale purchasers, Japa- nese packaging methods, and Japa- nese agents for U.S. exporters. Part two

  17. Public Sector Electric Efficiency Programs

    Broader source: Energy.gov [DOE]

    The Illinois Department of Commerce and Economic Opportunity (DCEO) Bureau of Energy and Recycling administers the public sector energy efficiency programs required by the Illinois Energy...

  18. Work Affecting Public Waters (Minnesota)

    Broader source: Energy.gov [DOE]

    Earlier sections of chapter 103G describe the process of delineating public waters; this section describes the responsibility of contractors and property owners when construction or other activity...

  19. Alternative Fuels Data Center: Publications

    Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

    Results | 9 publications Title Author Date Category Sorting Through the Many Total-Energy-Cycle Pathways Possible with Early Plug-In Hybrids Gaines, L.; Burnham, A.; Rousseau,...

  20. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21T23:59:59.000Z

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  1. Field Test of Measurement-Device-Independent Quantum Key Distribution

    E-Print Network [OSTI]

    Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

    2014-08-11T23:59:59.000Z

    A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

  2. Connate Water Saturation -Irreducible or Not: the Key to Reliable Hydraulic Rock Typing in Reservoirs Straddling Multiple Capillary Windows

    E-Print Network [OSTI]

    Torres-Verdín, Carlos

    of flow capacity. High in-situ capillary pressure causes connate water saturation in reservoir rocks petrophysical analysis based solely on conventional logs, including gamma ray, neutron porosity, bulk densitySPE 166082 Connate Water Saturation - Irreducible or Not: the Key to Reliable Hydraulic Rock Typing

  3. BIOENERGY PROGRAM Agronomics is the science of soil management and the production of field crops. Key ele-

    E-Print Network [OSTI]

    Processing To meet United States Department of Energy projections, 110, 000 truckloads per day of feedstocksAgronomics BIOENERGY PROGRAM Agronomics is the science of soil management and the production of field crops. Key ele- ments of a production and delivery system include high-tonnage feedstocks, proven

  4. Associate editor: S. Pestka Functions of the cytoplasmic RNA sensors RIG-I and MDA-5: Key regulators of

    E-Print Network [OSTI]

    DeSalle, Rob

    Associate editor: S. Pestka Functions of the cytoplasmic RNA sensors RIG-I and MDA-5: Key York, NY, USA a b s t r a c ta r t i c l e i n f o Keywords: Antiviral innate immunity MDA-5 RIG been identified, which comprises the cytoplasmic sensors of viral nucleic acids, including MDA-5, RIG

  5. Course: Math 311w-01 Laboratory 5: The RSA cipher and public-key cryptography, part 1

    E-Print Network [OSTI]

    Reluga, Tim

    if these communications channels are secure. Bitcoin currency is a technology developed using related ideas, and suffering

  6. A Decentralized Public Key Infrastructure with Identity Retention Conner Fromknecht (conner@mit.edu), Dragos Velicanu (velicanu@mit.edu),

    E-Print Network [OSTI]

    provided by cryptocurrencies such as Bitcoin and Namecoin to build a PKI that ensures identity retention

  7. Course: Math 311w-01 Laboratory 6: The RSA cipher and public-key cryptography, part 2

    E-Print Network [OSTI]

    Reluga, Tim

    , change to the Desktop directory if you aren't already there, and start ipython. Type ]: from RSA import

  8. GRADUATE PROGRAMS IN PUBLIC HEALTH Master of Public Health

    E-Print Network [OSTI]

    Cinabro, David

    of Family Medicine and Public Health Sciences Wayne State University School of Medicine in the Department of Family Medicine and Public Health Sciences (DFMPHS). The following manual is designed information, and required forms that will need to be filled out at different stages of your progress

  9. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10T23:59:59.000Z

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  10. Eavesdropper's Optimal Information in Variations of Bennett-Brassard 1984 Quantum Key Distribution in the Coherent Attacks

    E-Print Network [OSTI]

    W. Y. Hwang; D. Ahn; S. W. Hwang

    2001-02-03T23:59:59.000Z

    We calculate eavesdropper's optimal information on raw bits in Bennett-Brassard 1984 quantum key distribution (BB84 QKD) and six-state scheme in coherent attacks, using a formula by Lo and Chau [Science 283 (1999) 2050] with single photon assumption. We find that eavesdropper's optimal information in QKD without public announcement of bases [Phys. Lett. A 244 (1998) 489] is the same as that of a corresponding QKD WITH it in the coherent attack. We observe a sum-rule concerning each party's information.

  11. BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo

    E-Print Network [OSTI]

    BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. ­ 2:00 p

  12. Articles which include chevron film cooling holes, and related processes

    DOE Patents [OSTI]

    Bunker, Ronald Scott; Lacy, Benjamin Paul

    2014-12-09T23:59:59.000Z

    An article is described, including an inner surface which can be exposed to a first fluid; an inlet; and an outer surface spaced from the inner surface, which can be exposed to a hotter second fluid. The article further includes at least one row or other pattern of passage holes. Each passage hole includes an inlet bore extending through the substrate from the inlet at the inner surface to a passage hole-exit proximate to the outer surface, with the inlet bore terminating in a chevron outlet adjacent the hole-exit. The chevron outlet includes a pair of wing troughs having a common surface region between them. The common surface region includes a valley which is adjacent the hole-exit; and a plateau adjacent the valley. The article can be an airfoil. Related methods for preparing the passage holes are also described.

  13. Scaling up Primary Health Services in Rural Tamil Nadu: Public Investment Requirements and Health Sector Reform

    E-Print Network [OSTI]

    Scaling up Primary Health Services in Rural Tamil Nadu: Public Investment Requirements and Health two key questions in this paper: 1) In terms of state-wide scaling up of rural services in the area of primary health, what will it cost financially and in terms of human resources to scale-up these services

  14. Secure Information Sharing and Dissemination in the Context of Public Security

    E-Print Network [OSTI]

    Secure Information Sharing and Dissemination in the Context of Public Security Professor Nabil R. Adam Director, The Center for Information Management Integration & Connectivity (CIMIC) Executive://cimic.rutgers.edu/~adam/ Abstract In the context of homeland security, one of the key challenges in such environment is achieving

  15. Dear Award Recipient, The Progress Report is a key award requirement of the CHRI Fellowship. The data gathered

    E-Print Network [OSTI]

    Bejerano, Gill

    . The data gathered here serves as a critical tool in tracking success and return-on-investment data to our-competitive renewal? Yes No Have any publications resulted from this work? Yes No Page 1 of 3Qualtrics Survey Software #12;How many total original peer-reviewed manuscripts resulted from this work (do NOT include book

  16. of Public Attitudes Energy & Environment

    E-Print Network [OSTI]

    and climate change-mitigation technologies; levels of public understanding of global warming and the carbon cycle; and awareness of carbon dioxide capture and storage (CCS). This report summarises the results explore public understanding of sources of carbon dioxide and a climate change-mitigation technology

  17. Public Participation and Community Relations

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-05-02T23:59:59.000Z

    To ensure that public participation and community outreach are integral and effective parts of DOE activities and that decisions are made with the benefit of significant public perspectives. Cancels DOE P 1210.1. Canceled by DOE N 251.104,

  18. In 2010 a group of key forestry players

    E-Print Network [OSTI]

    Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

  19. Key issues of FED/INTOR impurity control system

    SciTech Connect (OSTI)

    Abdou, M.A.

    1982-10-01T23:59:59.000Z

    A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

  20. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi